<?xml version='1.0' encoding='utf-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>AlmaLinux OS Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2026-03-13T16:38:24</oval:timestamp>
  </generator>
  <definitions>
    <definition id="oval:org.almalinux.alsa:def:202511861" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:11861: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2024-57980" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-57980"/>
        <reference ref_id="CVE-2025-21905" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-21905"/>
        <reference ref_id="CVE-2025-22085" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-22085"/>
        <reference ref_id="CVE-2025-22091" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-22091"/>
        <reference ref_id="CVE-2025-22113" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-22113"/>
        <reference ref_id="CVE-2025-22121" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-22121"/>
        <reference ref_id="CVE-2025-37797" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-37797"/>
        <reference ref_id="CVE-2025-37958" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-37958"/>
        <reference ref_id="CVE-2025-38086" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38086"/>
        <reference ref_id="CVE-2025-38110" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38110"/>
        <reference ref_id="RHSA-2025:11861" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:11861"/>
        <reference ref_id="ALSA-2025:11861" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-11861.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
  * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
  * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
  * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
  * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
  * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
  * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
  * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
  * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
  * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-07-28"/>
          <updated date="2025-07-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2348599" id="2348599"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2356613" id="2356613"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2360186" id="2360186"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2360199" id="2360199"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2360212" id="2360212"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2360219" id="2360219"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2363672" id="2363672"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2367572" id="2367572"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2375305" id="2375305"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2376035" id="2376035"></bugzilla>
          <cve public="20250227" href="https://access.redhat.com/security/cve/CVE-2024-57980" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-57980</cve>
          <cve public="20250401" href="https://access.redhat.com/security/cve/CVE-2025-21905" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H">CVE-2025-21905</cve>
          <cve public="20250416" href="https://access.redhat.com/security/cve/CVE-2025-22085" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2025-22085</cve>
          <cve public="20250416" href="https://access.redhat.com/security/cve/CVE-2025-22091" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-22091</cve>
          <cve public="20250416" href="https://access.redhat.com/security/cve/CVE-2025-22113" impact="Moderate" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2025-22113</cve>
          <cve public="20250416" href="https://access.redhat.com/security/cve/CVE-2025-22121" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2025-22121</cve>
          <cve public="20250502" href="https://access.redhat.com/security/cve/CVE-2025-37797" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-37797</cve>
          <cve public="20250520" href="https://access.redhat.com/security/cve/CVE-2025-37958" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2025-37958</cve>
          <cve public="20250628" href="https://access.redhat.com/security/cve/CVE-2025-38086" impact="Moderate" cwe="CWE-908" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-38086</cve>
          <cve public="20250703" href="https://access.redhat.com/security/cve/CVE-2025-38110" impact="Moderate" cwe="CWE-1284" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N">CVE-2025-38110</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861001" comment="perf is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861002" comment="python3-perf is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861003" comment="rtla is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861004" comment="rv is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861005" comment="kernel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861006" comment="kernel-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861007" comment="kernel-debug is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861008" comment="kernel-debug-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861009" comment="kernel-debug-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861010" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861011" comment="kernel-debug-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861012" comment="kernel-debug-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861013" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861014" comment="kernel-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861015" comment="kernel-devel-matched is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861016" comment="kernel-headers is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861017" comment="kernel-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861018" comment="kernel-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861019" comment="kernel-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861020" comment="kernel-tools is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861021" comment="kernel-tools-libs is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861022" comment="kernel-64k is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861023" comment="kernel-64k-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861024" comment="kernel-64k-debug is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861025" comment="kernel-64k-debug-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861026" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861027" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861028" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861029" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861030" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861031" comment="kernel-64k-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861032" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861033" comment="kernel-64k-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861034" comment="kernel-64k-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861035" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861036" comment="kernel-rt is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861037" comment="kernel-rt-64k is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423076" comment="kernel-rt-64k is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861038" comment="kernel-rt-64k-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423078" comment="kernel-rt-64k-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861039" comment="kernel-rt-64k-debug is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423080" comment="kernel-rt-64k-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861040" comment="kernel-rt-64k-debug-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423082" comment="kernel-rt-64k-debug-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861041" comment="kernel-rt-64k-debug-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423084" comment="kernel-rt-64k-debug-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861042" comment="kernel-rt-64k-debug-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423086" comment="kernel-rt-64k-debug-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861043" comment="kernel-rt-64k-debug-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423005" comment="kernel-rt-64k-debug-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861044" comment="kernel-rt-64k-debug-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423007" comment="kernel-rt-64k-debug-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861045" comment="kernel-rt-64k-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423009" comment="kernel-rt-64k-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861046" comment="kernel-rt-64k-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423011" comment="kernel-rt-64k-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861047" comment="kernel-rt-64k-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423013" comment="kernel-rt-64k-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861048" comment="kernel-rt-64k-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423015" comment="kernel-rt-64k-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861049" comment="kernel-rt-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861050" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861051" comment="kernel-rt-debug is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861052" comment="kernel-rt-debug-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861053" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861054" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861055" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861056" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861057" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861058" comment="kernel-rt-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861059" comment="kernel-rt-kvm is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861060" comment="kernel-rt-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861061" comment="kernel-rt-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861062" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861063" comment="kernel-uki-virt is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861064" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861065" comment="kernel-zfcpdump is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861066" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861067" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861068" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861069" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861070" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861071" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861072" comment="kernel-cross-headers is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861073" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861074" comment="libperf is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861075" comment="kernel-abi-stablelists is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202511861076" comment="kernel-doc is earlier than 0:5.14.0-570.30.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248563" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8563: buildah security update (Important)</title>
        <reference ref_id="CVE-2024-9675" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9675"/>
        <reference ref_id="RHSA-2024:8563" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8563"/>
        <reference ref_id="ALSA-2024:8563" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8563.html"/>
        <description>The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.   

Security Fix(es):  

  * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-29"/>
          <updated date="2024-10-29"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2317458" id="2317458"></bugzilla>
          <cve public="20241009" href="https://access.redhat.com/security/cve/CVE-2024-9675" impact="Important" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2024-9675</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248563001" comment="buildah is earlier than 2:1.33.10-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228008002" comment="buildah is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248563002" comment="buildah-tests is earlier than 2:1.33.10-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228008004" comment="buildah-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248680" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8680: mod_http2 security update (Low)</title>
        <reference ref_id="CVE-2024-36387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36387"/>
        <reference ref_id="RHSA-2024:8680" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8680"/>
        <reference ref_id="ALSA-2024:8680" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8680.html"/>
        <description>The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.  

Security Fix(es):  

  * mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-30"/>
          <updated date="2024-10-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295006" id="2295006"></bugzilla>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-36387" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-36387</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20248680001" comment="mod_http2 is earlier than 0:2.0.26-2.el9_4.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20231670024" comment="mod_http2 is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249088" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9088: edk2 security update (Moderate)</title>
        <reference ref_id="CVE-2023-6129" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6129"/>
        <reference ref_id="CVE-2023-6237" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6237"/>
        <reference ref_id="CVE-2024-0727" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0727"/>
        <reference ref_id="CVE-2024-1298" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1298"/>
        <reference ref_id="RHSA-2024:9088" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9088"/>
        <reference ref_id="ALSA-2024:9088" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9088.html"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.   

Security Fix(es):  

  * mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)
  * openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
  * openssl: denial of service via null dereference (CVE-2024-0727)
  * edk2: Temporary DoS vulnerability (CVE-2024-1298)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257571" id="2257571"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258502" id="2258502"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259944" id="2259944"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284243" id="2284243"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2023-6129" impact="Low" cwe="CWE-328" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H">CVE-2023-6129</cve>
          <cve public="20240115" href="https://access.redhat.com/security/cve/CVE-2023-6237" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6237</cve>
          <cve public="20240122" href="https://access.redhat.com/security/cve/CVE-2024-0727" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2024-0727</cve>
          <cve public="20240531" href="https://access.redhat.com/security/cve/CVE-2024-1298" impact="Moderate" cwe="CWE-369" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2024-1298</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249088001" comment="edk2-tools is earlier than 0:20240524-6.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165006" comment="edk2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249088002" comment="edk2-ovmf is earlier than 0:20240524-6.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165004" comment="edk2-ovmf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249088003" comment="edk2-tools-doc is earlier than 0:20240524-6.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165008" comment="edk2-tools-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249088004" comment="edk2-aarch64 is earlier than 0:20240524-6.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165002" comment="edk2-aarch64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202513962" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:13962: kernel security update (Important)</title>
        <reference ref_id="CVE-2024-28956" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28956"/>
        <reference ref_id="CVE-2025-21867" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-21867"/>
        <reference ref_id="CVE-2025-38084" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38084"/>
        <reference ref_id="CVE-2025-38085" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38085"/>
        <reference ref_id="CVE-2025-38124" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38124"/>
        <reference ref_id="CVE-2025-38159" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38159"/>
        <reference ref_id="CVE-2025-38250" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38250"/>
        <reference ref_id="CVE-2025-38380" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38380"/>
        <reference ref_id="CVE-2025-38471" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38471"/>
        <reference ref_id="RHSA-2025:13962" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:13962"/>
        <reference ref_id="ALSA-2025:13962" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-13962.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (CVE-2025-21867)
  * microcode_ctl: From CVEorg collector (CVE-2024-28956)
  * kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
  * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
  * kernel: net: fix udp gso skb_segment after pull from frag_list (CVE-2025-38124)
  * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
  * kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush() (CVE-2025-38250)
  * kernel: i2c/designware: Fix an initialization issue (CVE-2025-38380)
  * kernel: tls: always refresh the queue when reading sock (CVE-2025-38471)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-08-18"/>
          <updated date="2025-08-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2355334" id="2355334"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2366125" id="2366125"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2375303" id="2375303"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2375304" id="2375304"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2376041" id="2376041"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2376064" id="2376064"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2378982" id="2378982"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2383381" id="2383381"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2383893" id="2383893"></bugzilla>
          <cve public="20250513" href="https://access.redhat.com/security/cve/CVE-2024-28956" impact="Moderate" cwe="CWE-1421" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2024-28956</cve>
          <cve public="20250327" href="https://access.redhat.com/security/cve/CVE-2025-21867" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-21867</cve>
          <cve public="20250628" href="https://access.redhat.com/security/cve/CVE-2025-38084" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2025-38084</cve>
          <cve public="20250628" href="https://access.redhat.com/security/cve/CVE-2025-38085" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2025-38085</cve>
          <cve public="20250703" href="https://access.redhat.com/security/cve/CVE-2025-38124" impact="Moderate" cwe="CWE-704" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-38124</cve>
          <cve public="20250703" href="https://access.redhat.com/security/cve/CVE-2025-38159" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2025-38159</cve>
          <cve public="20250709" href="https://access.redhat.com/security/cve/CVE-2025-38250" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2025-38250</cve>
          <cve public="20250725" href="https://access.redhat.com/security/cve/CVE-2025-38380" impact="Important" cwe="CWE-908" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-38380</cve>
          <cve public="20250728" href="https://access.redhat.com/security/cve/CVE-2025-38471" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H">CVE-2025-38471</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962001" comment="perf is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962002" comment="libperf is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962003" comment="kernel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962004" comment="kernel-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962005" comment="kernel-debug is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962006" comment="kernel-debug-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962007" comment="kernel-debug-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962008" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962009" comment="kernel-debug-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962010" comment="kernel-debug-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962011" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962012" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962013" comment="kernel-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962014" comment="kernel-devel-matched is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962015" comment="kernel-headers is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962016" comment="kernel-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962017" comment="kernel-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962018" comment="kernel-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962019" comment="kernel-rt is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962020" comment="kernel-rt-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962021" comment="kernel-rt-debug is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962022" comment="kernel-rt-debug-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962023" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962024" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962025" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962026" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962027" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962028" comment="kernel-rt-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962029" comment="kernel-rt-kvm is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962030" comment="kernel-rt-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962031" comment="kernel-rt-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962032" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962033" comment="kernel-tools is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962034" comment="kernel-tools-libs is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962035" comment="kernel-uki-virt is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962036" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962037" comment="python3-perf is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962038" comment="rtla is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962039" comment="rv is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962040" comment="kernel-zfcpdump is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962041" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962042" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962043" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962044" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962045" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962046" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962047" comment="kernel-64k is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962048" comment="kernel-64k-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962049" comment="kernel-64k-debug is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962050" comment="kernel-64k-debug-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962051" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962052" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962053" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962054" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962055" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962056" comment="kernel-64k-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962057" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962058" comment="kernel-64k-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962059" comment="kernel-64k-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962060" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962061" comment="kernel-rt-64k is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423076" comment="kernel-rt-64k is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962062" comment="kernel-rt-64k-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423078" comment="kernel-rt-64k-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962063" comment="kernel-rt-64k-debug is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423080" comment="kernel-rt-64k-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962064" comment="kernel-rt-64k-debug-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423082" comment="kernel-rt-64k-debug-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962065" comment="kernel-rt-64k-debug-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423084" comment="kernel-rt-64k-debug-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962066" comment="kernel-rt-64k-debug-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423086" comment="kernel-rt-64k-debug-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962067" comment="kernel-rt-64k-debug-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423005" comment="kernel-rt-64k-debug-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962068" comment="kernel-rt-64k-debug-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423007" comment="kernel-rt-64k-debug-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962069" comment="kernel-rt-64k-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423009" comment="kernel-rt-64k-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962070" comment="kernel-rt-64k-modules is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423011" comment="kernel-rt-64k-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962071" comment="kernel-rt-64k-modules-core is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423013" comment="kernel-rt-64k-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962072" comment="kernel-rt-64k-modules-extra is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423015" comment="kernel-rt-64k-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962073" comment="kernel-cross-headers is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962074" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962075" comment="kernel-abi-stablelists is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202513962076" comment="kernel-doc is earlier than 0:5.14.0-570.35.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202522405" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:22405: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2025-38724" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38724"/>
        <reference ref_id="CVE-2025-39864" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39864"/>
        <reference ref_id="CVE-2025-39898" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39898"/>
        <reference ref_id="CVE-2025-39918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39918"/>
        <reference ref_id="CVE-2025-39955" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39955"/>
        <reference ref_id="CVE-2025-39981" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39981"/>
        <reference ref_id="CVE-2025-40058" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-40058"/>
        <reference ref_id="CVE-2025-40185" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-40185"/>
        <reference ref_id="RHSA-2025:22405" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:22405"/>
        <reference ref_id="ALSA-2025:22405" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-22405.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724)
  * kernel: wifi: cfg80211: fix use-after-free in cmp_bss() (CVE-2025-39864)
  * kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)
  * kernel: wifi: mt76: fix linked list corruption (CVE-2025-39918)
  * kernel: tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect() (CVE-2025-39955)
  * kernel: Bluetooth: MGMT: Fix possible UAFs (CVE-2025-39981)
  * kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk (CVE-2025-40058)
  * kernel: ice: ice_adapter: release xa entry on adapter allocation failure (CVE-2025-40185)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-12-01"/>
          <updated date="2025-12-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2393172" id="2393172"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2396934" id="2396934"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2400598" id="2400598"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2400628" id="2400628"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2402699" id="2402699"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2404105" id="2404105"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2406776" id="2406776"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2414741" id="2414741"></bugzilla>
          <cve public="20250904" href="https://access.redhat.com/security/cve/CVE-2025-38724" impact="Moderate" cwe="CWE-367" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-38724</cve>
          <cve public="20250919" href="https://access.redhat.com/security/cve/CVE-2025-39864" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-39864</cve>
          <cve public="20251001" href="https://access.redhat.com/security/cve/CVE-2025-39898" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2025-39898</cve>
          <cve public="20251001" href="https://access.redhat.com/security/cve/CVE-2025-39918" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2025-39918</cve>
          <cve public="20251009" href="https://access.redhat.com/security/cve/CVE-2025-39955" impact="Moderate" cwe="CWE-213" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2025-39955</cve>
          <cve public="20251015" href="https://access.redhat.com/security/cve/CVE-2025-39981" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H">CVE-2025-39981</cve>
          <cve public="20251028" href="https://access.redhat.com/security/cve/CVE-2025-40058" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H">CVE-2025-40058</cve>
          <cve public="20251112" href="https://access.redhat.com/security/cve/CVE-2025-40185" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2025-40185</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405001" comment="libperf is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405002" comment="kernel-cross-headers is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405003" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405004" comment="kernel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405005" comment="kernel-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405006" comment="kernel-debug is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405007" comment="kernel-debug-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405008" comment="kernel-debug-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405009" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405010" comment="kernel-debug-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405011" comment="kernel-debug-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405012" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405013" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405014" comment="kernel-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405015" comment="kernel-devel-matched is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405016" comment="kernel-headers is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405017" comment="kernel-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405018" comment="kernel-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405019" comment="kernel-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405020" comment="kernel-rt is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405021" comment="kernel-rt-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405022" comment="kernel-rt-debug is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405023" comment="kernel-rt-debug-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405024" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405025" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405026" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405027" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405028" comment="kernel-rt-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405029" comment="kernel-rt-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405030" comment="kernel-rt-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405031" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405032" comment="kernel-tools is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405033" comment="kernel-tools-libs is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405034" comment="kernel-uki-virt is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405035" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405036" comment="perf is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405037" comment="python3-perf is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405038" comment="rtla is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405039" comment="rv is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405040" comment="kernel-zfcpdump is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405041" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405042" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405043" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405044" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405045" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405046" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405047" comment="kernel-64k is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405048" comment="kernel-64k-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405049" comment="kernel-64k-debug is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405050" comment="kernel-64k-debug-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405051" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405052" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405053" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405054" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405055" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405056" comment="kernel-64k-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405057" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405058" comment="kernel-64k-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405059" comment="kernel-64k-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405060" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405061" comment="kernel-rt-64k is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423076" comment="kernel-rt-64k is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405062" comment="kernel-rt-64k-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423078" comment="kernel-rt-64k-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405063" comment="kernel-rt-64k-debug is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423080" comment="kernel-rt-64k-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405064" comment="kernel-rt-64k-debug-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423082" comment="kernel-rt-64k-debug-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405065" comment="kernel-rt-64k-debug-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423084" comment="kernel-rt-64k-debug-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405066" comment="kernel-rt-64k-debug-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423086" comment="kernel-rt-64k-debug-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405067" comment="kernel-rt-64k-debug-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423005" comment="kernel-rt-64k-debug-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405068" comment="kernel-rt-64k-debug-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423007" comment="kernel-rt-64k-debug-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405069" comment="kernel-rt-64k-devel is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423009" comment="kernel-rt-64k-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405070" comment="kernel-rt-64k-modules is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423011" comment="kernel-rt-64k-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405071" comment="kernel-rt-64k-modules-core is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423013" comment="kernel-rt-64k-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405072" comment="kernel-rt-64k-modules-extra is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423015" comment="kernel-rt-64k-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405073" comment="kernel-abi-stablelists is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202522405074" comment="kernel-doc is earlier than 0:5.14.0-611.11.1.el9_7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202518281" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:18281: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2022-50087" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-50087"/>
        <reference ref_id="CVE-2025-22026" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-22026"/>
        <reference ref_id="CVE-2025-38566" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38566"/>
        <reference ref_id="CVE-2025-38571" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-38571"/>
        <reference ref_id="CVE-2025-39817" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39817"/>
        <reference ref_id="CVE-2025-39841" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39841"/>
        <reference ref_id="CVE-2025-39849" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-39849"/>
        <reference ref_id="RHSA-2025:18281" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:18281"/>
        <reference ref_id="ALSA-2025:18281" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-18281.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: nfsd: don't ignore the return code of svc_proc_register() (CVE-2025-22026)
  * kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (CVE-2022-50087)
  * kernel: sunrpc: fix client side handling of tls alerts (CVE-2025-38571)
  * kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
  * kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
  * kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849)
  * kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-10-20"/>
          <updated date="2025-10-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2360224" id="2360224"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2373539" id="2373539"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2389480" id="2389480"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2389487" id="2389487"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2395805" id="2395805"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2396928" id="2396928"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2396944" id="2396944"></bugzilla>
          <cve public="20250618" href="https://access.redhat.com/security/cve/CVE-2022-50087" impact="Moderate" cwe="CWE-825" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-50087</cve>
          <cve public="20250416" href="https://access.redhat.com/security/cve/CVE-2025-22026" impact="Moderate" cwe="CWE-252" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2025-22026</cve>
          <cve public="20250819" href="https://access.redhat.com/security/cve/CVE-2025-38566" impact="Moderate" cwe="CWE-754" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2025-38566</cve>
          <cve public="20250819" href="https://access.redhat.com/security/cve/CVE-2025-38571" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2025-38571</cve>
          <cve public="20250916" href="https://access.redhat.com/security/cve/CVE-2025-39817" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-39817</cve>
          <cve public="20250919" href="https://access.redhat.com/security/cve/CVE-2025-39841" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2025-39841</cve>
          <cve public="20250919" href="https://access.redhat.com/security/cve/CVE-2025-39849" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2025-39849</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281001" comment="perf is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281002" comment="python3-perf is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281003" comment="rtla is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281004" comment="rv is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281005" comment="kernel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281006" comment="kernel-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281007" comment="kernel-debug is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281008" comment="kernel-debug-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281009" comment="kernel-debug-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281010" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281011" comment="kernel-debug-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281012" comment="kernel-debug-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281013" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281014" comment="kernel-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281015" comment="kernel-devel-matched is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281016" comment="kernel-headers is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281017" comment="kernel-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281018" comment="kernel-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281019" comment="kernel-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281020" comment="kernel-tools is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281021" comment="kernel-zfcpdump is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281022" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281023" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281024" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281025" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281026" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281027" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281028" comment="kernel-tools-libs is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281029" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281030" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281031" comment="kernel-64k-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281032" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281033" comment="kernel-rt is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281034" comment="kernel-rt-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281035" comment="kernel-rt-debug is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281036" comment="kernel-rt-debug-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281037" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281038" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281039" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281040" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281041" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281042" comment="kernel-rt-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281043" comment="kernel-rt-kvm is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281044" comment="kernel-rt-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281045" comment="kernel-rt-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281046" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281047" comment="kernel-uki-virt is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281048" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281049" comment="kernel-64k is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281050" comment="kernel-64k-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281051" comment="kernel-64k-debug is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281052" comment="kernel-64k-debug-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281053" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281054" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281055" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281056" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281057" comment="kernel-64k-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281058" comment="kernel-64k-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281059" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281060" comment="kernel-rt-64k is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423076" comment="kernel-rt-64k is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281061" comment="kernel-rt-64k-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423078" comment="kernel-rt-64k-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281062" comment="kernel-rt-64k-debug is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423080" comment="kernel-rt-64k-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281063" comment="kernel-rt-64k-debug-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423082" comment="kernel-rt-64k-debug-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281064" comment="kernel-rt-64k-debug-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423084" comment="kernel-rt-64k-debug-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281065" comment="kernel-rt-64k-debug-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423086" comment="kernel-rt-64k-debug-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281066" comment="kernel-rt-64k-debug-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423005" comment="kernel-rt-64k-debug-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281067" comment="kernel-rt-64k-debug-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423007" comment="kernel-rt-64k-debug-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281068" comment="kernel-rt-64k-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423009" comment="kernel-rt-64k-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281069" comment="kernel-rt-64k-modules is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423011" comment="kernel-rt-64k-modules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281070" comment="kernel-rt-64k-modules-core is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423013" comment="kernel-rt-64k-modules-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281071" comment="kernel-rt-64k-modules-extra is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20257423015" comment="kernel-rt-64k-modules-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281072" comment="kernel-cross-headers is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281073" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281074" comment="libperf is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281075" comment="kernel-abi-stablelists is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202518281076" comment="kernel-doc is earlier than 0:5.14.0-570.55.1.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242132" version="640" class="patch">
      <metadata>
        <title>ALSA-2024:2132: fence-agents security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:2132" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2132"/>
        <reference ref_id="CVE-2023-45803" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45803"/>
        <reference ref_id="CVE-2023-52323" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52323"/>
        <reference ref_id="CVE-2024-22195" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-22195"/>
        <reference ref_id="ALSA-2024:2132" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2132.html"/>
        <description>The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. 

Security Fix(es):

* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)
* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2246840" id="2246840"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257028" id="2257028"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257854" id="2257854"></bugzilla>
          <cve public="20231013" href="https://access.redhat.com/security/cve/CVE-2023-45803" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45803</cve>
          <cve public="20240105" href="https://access.redhat.com/security/cve/CVE-2023-52323" impact="Moderate" cwe="CWE-203" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-52323</cve>
          <cve public="20240111" href="https://access.redhat.com/security/cve/CVE-2024-22195" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-22195</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132110" comment="fence-agents-aliyun is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161002" comment="fence-agents-aliyun is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132003" comment="fence-agents-all is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161004" comment="fence-agents-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132111" comment="fence-agents-aws is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161012" comment="fence-agents-aws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132112" comment="fence-agents-azure-arm is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161014" comment="fence-agents-azure-arm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132113" comment="fence-agents-compute is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161026" comment="fence-agents-compute is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132114" comment="fence-agents-gce is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161036" comment="fence-agents-gce is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132063" comment="fence-agents-kdump is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161064" comment="fence-agents-kdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132065" comment="fence-agents-kubevirt is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161066" comment="fence-agents-kubevirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132115" comment="fence-agents-openstack is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161072" comment="fence-agents-openstack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132073" comment="fence-agents-redfish is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161074" comment="fence-agents-redfish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132116" comment="fence-agents-zvm is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161094" comment="fence-agents-zvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132117" comment="fence-virt is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161096" comment="fence-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132118" comment="fence-virtd is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161098" comment="fence-virtd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132119" comment="fence-virtd-cpg is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161100" comment="fence-virtd-cpg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132120" comment="fence-virtd-libvirt is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161102" comment="fence-virtd-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132121" comment="fence-virtd-multicast is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161104" comment="fence-virtd-multicast is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132122" comment="fence-virtd-serial is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161106" comment="fence-virtd-serial is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132123" comment="fence-virtd-tcp is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161108" comment="fence-virtd-tcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132124" comment="ha-cloud-support is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161110" comment="ha-cloud-support is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132005" comment="fence-agents-amt-ws is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161006" comment="fence-agents-amt-ws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132007" comment="fence-agents-apc is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161008" comment="fence-agents-apc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132009" comment="fence-agents-apc-snmp is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161010" comment="fence-agents-apc-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132015" comment="fence-agents-bladecenter is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161016" comment="fence-agents-bladecenter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132017" comment="fence-agents-brocade is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161018" comment="fence-agents-brocade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132019" comment="fence-agents-cisco-mds is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161020" comment="fence-agents-cisco-mds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132021" comment="fence-agents-cisco-ucs is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161022" comment="fence-agents-cisco-ucs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132023" comment="fence-agents-common is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161024" comment="fence-agents-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132027" comment="fence-agents-drac5 is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161028" comment="fence-agents-drac5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132029" comment="fence-agents-eaton-snmp is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161030" comment="fence-agents-eaton-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132031" comment="fence-agents-emerson is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161032" comment="fence-agents-emerson is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132033" comment="fence-agents-eps is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161034" comment="fence-agents-eps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132037" comment="fence-agents-heuristics-ping is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161038" comment="fence-agents-heuristics-ping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132039" comment="fence-agents-hpblade is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161040" comment="fence-agents-hpblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132041" comment="fence-agents-ibm-powervs is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161042" comment="fence-agents-ibm-powervs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132043" comment="fence-agents-ibm-vpc is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161044" comment="fence-agents-ibm-vpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132045" comment="fence-agents-ibmblade is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161046" comment="fence-agents-ibmblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132047" comment="fence-agents-ifmib is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161048" comment="fence-agents-ifmib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132049" comment="fence-agents-ilo-moonshot is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161050" comment="fence-agents-ilo-moonshot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132051" comment="fence-agents-ilo-mp is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161052" comment="fence-agents-ilo-mp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132053" comment="fence-agents-ilo-ssh is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161054" comment="fence-agents-ilo-ssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132055" comment="fence-agents-ilo2 is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161056" comment="fence-agents-ilo2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132057" comment="fence-agents-intelmodular is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161058" comment="fence-agents-intelmodular is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132059" comment="fence-agents-ipdu is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161060" comment="fence-agents-ipdu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132061" comment="fence-agents-ipmilan is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161062" comment="fence-agents-ipmilan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132067" comment="fence-agents-lpar is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161068" comment="fence-agents-lpar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132069" comment="fence-agents-mpath is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161070" comment="fence-agents-mpath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132075" comment="fence-agents-rhevm is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161076" comment="fence-agents-rhevm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132077" comment="fence-agents-rsa is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161078" comment="fence-agents-rsa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132079" comment="fence-agents-rsb is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161080" comment="fence-agents-rsb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132081" comment="fence-agents-sbd is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161082" comment="fence-agents-sbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132083" comment="fence-agents-scsi is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161084" comment="fence-agents-scsi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132085" comment="fence-agents-virsh is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161086" comment="fence-agents-virsh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132087" comment="fence-agents-vmware-rest is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161088" comment="fence-agents-vmware-rest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132089" comment="fence-agents-vmware-soap is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161090" comment="fence-agents-vmware-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242132091" comment="fence-agents-wti is earlier than 0:4.10.0-62.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161092" comment="fence-agents-wti is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20253713" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:3713: webkit2gtk3 security update (Important)</title>
        <reference ref_id="CVE-2024-44192" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-44192"/>
        <reference ref_id="CVE-2024-54467" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-54467"/>
        <reference ref_id="CVE-2024-54551" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-54551"/>
        <reference ref_id="CVE-2025-24208" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-24208"/>
        <reference ref_id="CVE-2025-24209" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-24209"/>
        <reference ref_id="CVE-2025-24216" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-24216"/>
        <reference ref_id="CVE-2025-30427" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-30427"/>
        <reference ref_id="RHSA-2025:3713" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:3713"/>
        <reference ref_id="ALSA-2025:3713" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-3713.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.  

Security Fix(es):  

  * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
  * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
  * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
  * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
  * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
  * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
  * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-04-08"/>
          <updated date="2025-04-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2353871" id="2353871"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2353872" id="2353872"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2357909" id="2357909"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2357910" id="2357910"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2357911" id="2357911"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2357917" id="2357917"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2357919" id="2357919"></bugzilla>
          <cve public="20250320" href="https://access.redhat.com/security/cve/CVE-2024-44192" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-44192</cve>
          <cve public="20250320" href="https://access.redhat.com/security/cve/CVE-2024-54467" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2024-54467</cve>
          <cve public="20250407" href="https://access.redhat.com/security/cve/CVE-2024-54551" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2024-54551</cve>
          <cve public="20250407" href="https://access.redhat.com/security/cve/CVE-2025-24208" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2025-24208</cve>
          <cve public="20250407" href="https://access.redhat.com/security/cve/CVE-2025-24209" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2025-24209</cve>
          <cve public="20250407" href="https://access.redhat.com/security/cve/CVE-2025-24216" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2025-24216</cve>
          <cve public="20250407" href="https://access.redhat.com/security/cve/CVE-2025-30427" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2025-30427</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253713001" comment="webkit2gtk3 is earlier than 0:2.48.1-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253713002" comment="webkit2gtk3-devel is earlier than 0:2.48.1-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253713003" comment="webkit2gtk3-jsc is earlier than 0:2.48.1-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253713004" comment="webkit2gtk3-jsc-devel is earlier than 0:2.48.1-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249051" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9051: podman security update (Important)</title>
        <reference ref_id="CVE-2024-9407" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9407"/>
        <reference ref_id="CVE-2024-9675" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9675"/>
        <reference ref_id="CVE-2024-9676" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9676"/>
        <reference ref_id="RHSA-2024:9051" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9051"/>
        <reference ref_id="ALSA-2024:9051" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9051.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.  

Security Fix(es):  

  * Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407)
  * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
  * Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-11"/>
          <updated date="2024-11-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2315887" id="2315887"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2317458" id="2317458"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2317467" id="2317467"></bugzilla>
          <cve public="20241001" href="https://access.redhat.com/security/cve/CVE-2024-9407" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N">CVE-2024-9407</cve>
          <cve public="20241009" href="https://access.redhat.com/security/cve/CVE-2024-9675" impact="Important" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2024-9675</cve>
          <cve public="20241015" href="https://access.redhat.com/security/cve/CVE-2024-9676" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-9676</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249051001" comment="podman is earlier than 4:4.9.4-16.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249051002" comment="podman-plugins is earlier than 4:4.9.4-16.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249051003" comment="podman-remote is earlier than 4:4.9.4-16.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249051004" comment="podman-tests is earlier than 4:4.9.4-16.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249051005" comment="podman-docker is earlier than 4:4.9.4-16.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249098" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9098: skopeo security update (Moderate)</title>
        <reference ref_id="CVE-2024-3727" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3727"/>
        <reference ref_id="CVE-2024-6104" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6104"/>
        <reference ref_id="CVE-2024-24788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24788"/>
        <reference ref_id="CVE-2024-24791" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24791"/>
        <reference ref_id="RHSA-2024:9098" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9098"/>
        <reference ref_id="ALSA-2024:9098" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9098.html"/>
        <description>The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.   

Security Fix(es):  

  * containers/image: digest type does not guarantee valid type (CVE-2024-3727)
  * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
  * go-retryable[http:](http:) url might write sensitive information to log file (CVE-2024-6104)
  * net/[http:](http:) Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2274767" id="2274767"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2279814" id="2279814"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2294000" id="2294000"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295310" id="2295310"></bugzilla>
          <cve public="20240509" href="https://access.redhat.com/security/cve/CVE-2024-3727" impact="Moderate" cwe="CWE-354" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2024-3727</cve>
          <cve public="20240624" href="https://access.redhat.com/security/cve/CVE-2024-6104" impact="Moderate" cwe="CWE-532" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N">CVE-2024-6104</cve>
          <cve public="20240508" href="https://access.redhat.com/security/cve/CVE-2024-24788" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-24788</cve>
          <cve public="20240702" href="https://access.redhat.com/security/cve/CVE-2024-24791" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-24791</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249098001" comment="skopeo is earlier than 2:1.16.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227955002" comment="skopeo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249098002" comment="skopeo-tests is earlier than 2:1.16.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227955004" comment="skopeo-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249122" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9122: xorg-x11-server security update (Moderate)</title>
        <reference ref_id="CVE-2024-31080" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-31080"/>
        <reference ref_id="CVE-2024-31081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-31081"/>
        <reference ref_id="CVE-2024-31083" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-31083"/>
        <reference ref_id="RHSA-2024:9122" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9122"/>
        <reference ref_id="ALSA-2024:9122" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9122.html"/>
        <description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.  

Security Fix(es):  

  * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
  * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
  * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2271997" id="2271997"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271998" id="2271998"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2272000" id="2272000"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-31080" impact="Important" cwe="CWE-126" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2024-31080</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-31081" impact="Important" cwe="CWE-126" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2024-31081</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-31083" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-31083</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122001" comment="xorg-x11-server-Xdmx is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221002" comment="xorg-x11-server-Xdmx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122002" comment="xorg-x11-server-Xephyr is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221004" comment="xorg-x11-server-Xephyr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122003" comment="xorg-x11-server-Xnest is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221006" comment="xorg-x11-server-Xnest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122004" comment="xorg-x11-server-Xorg is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221008" comment="xorg-x11-server-Xorg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122005" comment="xorg-x11-server-Xvfb is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221010" comment="xorg-x11-server-Xvfb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122006" comment="xorg-x11-server-common is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221012" comment="xorg-x11-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122007" comment="xorg-x11-server-devel is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221014" comment="xorg-x11-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249122008" comment="xorg-x11-server-source is earlier than 0:1.20.11-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221016" comment="xorg-x11-server-source is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249150" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9150: python-jinja2 security update (Moderate)</title>
        <reference ref_id="CVE-2024-34064" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34064"/>
        <reference ref_id="RHSA-2024:9150" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9150"/>
        <reference ref_id="ALSA-2024:9150" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9150.html"/>
        <description>The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.   

Security Fix(es):  

  * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2279476" id="2279476"></bugzilla>
          <cve public="20240506" href="https://access.redhat.com/security/cve/CVE-2024-34064" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-34064</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249150001" comment="python3-jinja2 is earlier than 0:2.11.3-6.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242348002" comment="python3-jinja2 is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249158" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9158: lldpd security update (Moderate)</title>
        <reference ref_id="CVE-2020-27827" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-27827"/>
        <reference ref_id="CVE-2021-43612" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-43612"/>
        <reference ref_id="CVE-2023-41910" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-41910"/>
        <reference ref_id="RHSA-2024:9158" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9158"/>
        <reference ref_id="ALSA-2024:9158" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9158.html"/>
        <description>LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.  

Security Fix(es):  

  * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827)
  * lldpd: out-of-bounds read when decoding SONMP packets (CVE-2021-43612)
  * lldpd: CDP PDU Packet cdp.c out-of-bounds read (CVE-2023-41910)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1921438" id="1921438"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2040388" id="2040388"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237411" id="2237411"></bugzilla>
          <cve public="20210113" href="https://access.redhat.com/security/cve/CVE-2020-27827" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2020-27827</cve>
          <cve public="20211118" href="https://access.redhat.com/security/cve/CVE-2021-43612" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2021-43612</cve>
          <cve public="20230905" href="https://access.redhat.com/security/cve/CVE-2023-41910" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-41910</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249158001" comment="lldpd is earlier than 0:1.0.18-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249158002" comment="lldpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249158003" comment="lldpd-devel is earlier than 0:1.0.18-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249158004" comment="lldpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20254787" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:4787: emacs security update (Moderate)</title>
        <reference ref_id="CVE-2024-53920" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-53920"/>
        <reference ref_id="RHSA-2025:4787" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:4787"/>
        <reference ref_id="ALSA-2025:4787" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-4787.html"/>
        <description>GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.  

Security Fix(es):  

  * emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-05-12"/>
          <updated date="2025-05-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2329161" id="2329161"></bugzilla>
          <cve public="20241127" href="https://access.redhat.com/security/cve/CVE-2024-53920" impact="Moderate" cwe="CWE-94" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-53920</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20254787001" comment="emacs is earlier than 1:27.2-11.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074002" comment="emacs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20254787002" comment="emacs-common is earlier than 1:27.2-11.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074004" comment="emacs-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20254787003" comment="emacs-lucid is earlier than 1:27.2-11.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074008" comment="emacs-lucid is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20254787004" comment="emacs-nox is earlier than 1:27.2-11.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074010" comment="emacs-nox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20254787005" comment="emacs-filesystem is earlier than 1:27.2-11.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074006" comment="emacs-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20253631" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:3631: python3.12 security update (Low)</title>
        <reference ref_id="CVE-2024-7592" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-7592"/>
        <reference ref_id="RHSA-2025:3631" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:3631"/>
        <reference ref_id="ALSA-2025:3631" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-3631.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.  

Security Fix(es):  

  * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-04-07"/>
          <updated date="2025-04-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <cve public="20240819" href="https://access.redhat.com/security/cve/CVE-2024-7592" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2024-7592</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631001" comment="python3.12 is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146015" comment="python3.12 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631002" comment="python3.12-devel is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146017" comment="python3.12-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631003" comment="python3.12-libs is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146019" comment="python3.12-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631004" comment="python3.12-tkinter is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146021" comment="python3.12-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631005" comment="python3.12-debug is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146016" comment="python3.12-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631006" comment="python3.12-idle is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146018" comment="python3.12-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253631007" comment="python3.12-test is earlier than 0:3.12.5-2.el9_5.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146020" comment="python3.12-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202517742" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:17742: vim security update (Moderate)</title>
        <reference ref_id="CVE-2025-53905" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-53905"/>
        <reference ref_id="CVE-2025-53906" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-53906"/>
        <reference ref_id="RHSA-2025:17742" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:17742"/>
        <reference ref_id="ALSA-2025:17742" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-17742.html"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.  

Security Fix(es):  

  * vim: Vim path traversal (CVE-2025-53906)
  * vim: Vim path traversial (CVE-2025-53905)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-10-13"/>
          <updated date="2025-10-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2380360" id="2380360"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2380362" id="2380362"></bugzilla>
          <cve public="20250715" href="https://access.redhat.com/security/cve/CVE-2025-53905" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L">CVE-2025-53905</cve>
          <cve public="20250715" href="https://access.redhat.com/security/cve/CVE-2025-53906" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L">CVE-2025-53906</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202517742001" comment="vim-X11 is earlier than 2:8.2.2637-22.el9_6.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242002" comment="vim-X11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202517742002" comment="vim-common is earlier than 2:8.2.2637-22.el9_6.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242004" comment="vim-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202517742003" comment="vim-enhanced is earlier than 2:8.2.2637-22.el9_6.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242006" comment="vim-enhanced is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202517742004" comment="vim-minimal is earlier than 2:8.2.2637-22.el9_6.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242010" comment="vim-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202517742005" comment="vim-filesystem is earlier than 2:8.2.2637-22.el9_6.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242008" comment="vim-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249167" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9167: poppler security update (Moderate)</title>
        <reference ref_id="CVE-2024-6239" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6239"/>
        <reference ref_id="RHSA-2024:9167" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9167"/>
        <reference ref_id="ALSA-2024:9167" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9167.html"/>
        <description>Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.  

Security Fix(es):  

  * poppler: pdfinfo: crash in broken documents when using -dests parameter (CVE-2024-6239)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2293594" id="2293594"></bugzilla>
          <cve public="20240606" href="https://access.redhat.com/security/cve/CVE-2024-6239" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2024-6239</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167001" comment="poppler is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151002" comment="poppler is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167002" comment="poppler-cpp is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151004" comment="poppler-cpp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167003" comment="poppler-glib is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151010" comment="poppler-glib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167004" comment="poppler-qt5 is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151014" comment="poppler-qt5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167005" comment="poppler-utils is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151018" comment="poppler-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167006" comment="poppler-cpp-devel is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151006" comment="poppler-cpp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167007" comment="poppler-devel is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151008" comment="poppler-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167008" comment="poppler-glib-devel is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151012" comment="poppler-glib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167009" comment="poppler-qt5-devel is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151016" comment="poppler-qt5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167010" comment="poppler-glib-doc is earlier than 0:21.01.0-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249167011" comment="poppler-glib-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249181" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9181: jose security update (Moderate)</title>
        <reference ref_id="CVE-2023-50967" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50967"/>
        <reference ref_id="CVE-2024-28176" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28176"/>
        <reference ref_id="RHSA-2024:9181" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9181"/>
        <reference ref_id="ALSA-2024:9181" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9181.html"/>
        <description>Jose is a C-language implementation of the Javascript Object Signing and Encryption standards. The jose package is a dependency of the clevis and tang packages, together providing Network Bound Disk Encryption (NBDE) in AlmaLinux.  

Security Fix(es):  

  * jose: resource exhaustion (CVE-2024-28176)
  * jose: Denial of service due to uncontrolled CPU consumption (CVE-2023-50967)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268820" id="2268820"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270538" id="2270538"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2023-50967" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50967</cve>
          <cve public="20240309" href="https://access.redhat.com/security/cve/CVE-2024-28176" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28176</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249181001" comment="jose is earlier than 0:14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249181002" comment="jose is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249181003" comment="libjose is earlier than 0:14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249181004" comment="libjose is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249181005" comment="libjose-devel is earlier than 0:14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249181006" comment="libjose-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249185" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9185: iperf3 security update (Moderate)</title>
        <reference ref_id="CVE-2023-7250" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-7250"/>
        <reference ref_id="CVE-2024-26306" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26306"/>
        <reference ref_id="RHSA-2024:9185" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9185"/>
        <reference ref_id="ALSA-2024:9185" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9185.html"/>
        <description>Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.  

Security Fix(es):  

  * iperf3: possible denial of service (CVE-2023-7250,ESNET-SECADV-2023-0002)
  * iperf3: vulnerable to marvin attack if the authentication option is used (CVE-2024-26306)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2244707" id="2244707"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270270" id="2270270"></bugzilla>
          <cve public="20231016" href="https://access.redhat.com/security/cve/CVE-2023-7250" impact="Moderate" cwe="CWE-183" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-7250</cve>
          <cve public="20240515" href="https://access.redhat.com/security/cve/CVE-2024-26306" impact="Moderate" cwe="CWE-203" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-26306</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249185001" comment="iperf3 is earlier than 0:3.9-13.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20234571002" comment="iperf3 is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249188" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9188: bpftrace security update (Low)</title>
        <reference ref_id="CVE-2024-2313" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2313"/>
        <reference ref_id="RHSA-2024:9188" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9188"/>
        <reference ref_id="ALSA-2024:9188" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9188.html"/>
        <description>BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap  

Security Fix(es):  

  * bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2269014" id="2269014"></bugzilla>
          <cve public="20240310" href="https://access.redhat.com/security/cve/CVE-2024-2313" impact="Low" cwe="CWE-284" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L">CVE-2024-2313</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249188001" comment="bpftrace is earlier than 0:0.21.1-1.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249188002" comment="bpftrace is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20251262" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:1262: kernel security update (Important)</title>
        <reference ref_id="CVE-2024-53104" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-53104"/>
        <reference ref_id="RHSA-2025:1262" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:1262"/>
        <reference ref_id="ALSA-2025:1262" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-1262.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-02-11"/>
          <updated date="2025-02-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2329817" id="2329817"></bugzilla>
          <cve public="20241202" href="https://access.redhat.com/security/cve/CVE-2024-53104" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H">CVE-2024-53104</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262001" comment="bpftool is earlier than 0:7.4.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262002" comment="kernel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262003" comment="kernel-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262004" comment="kernel-debug is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262005" comment="kernel-debug-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262006" comment="kernel-debug-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262008" comment="kernel-debug-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262012" comment="kernel-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262013" comment="kernel-devel-matched is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262014" comment="kernel-headers is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262015" comment="kernel-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262016" comment="kernel-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262017" comment="kernel-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262018" comment="kernel-tools is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262019" comment="kernel-tools-libs is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262020" comment="kernel-uki-virt is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262021" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262022" comment="perf is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262023" comment="python3-perf is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262024" comment="rtla is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262025" comment="rv is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262026" comment="kernel-zfcpdump is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262027" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262028" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262029" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262030" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262031" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262032" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262033" comment="kernel-rt is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262034" comment="kernel-rt-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262035" comment="kernel-rt-debug is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262036" comment="kernel-rt-debug-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262037" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262038" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262039" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262040" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262041" comment="kernel-rt-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262042" comment="kernel-rt-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262043" comment="kernel-rt-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262044" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262045" comment="kernel-64k is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262046" comment="kernel-64k-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262047" comment="kernel-64k-debug is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262048" comment="kernel-64k-debug-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262049" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262050" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262051" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262052" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262053" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262054" comment="kernel-64k-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262055" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262056" comment="kernel-64k-modules is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262057" comment="kernel-64k-modules-core is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262058" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262059" comment="kernel-cross-headers is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262060" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262061" comment="libperf is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262062" comment="kernel-abi-stablelists is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251262063" comment="kernel-doc is earlier than 0:5.14.0-503.23.2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202510550" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:10550: podman security update (Important)</title>
        <reference ref_id="CVE-2025-6032" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-6032"/>
        <reference ref_id="RHSA-2025:10550" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:10550"/>
        <reference ref_id="ALSA-2025:10550" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-10550.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.  

Security Fix(es):  

  * podman: podman missing TLS verification (CVE-2025-6032)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-07-08"/>
          <updated date="2025-07-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2372501" id="2372501"></bugzilla>
          <cve public="20250624" href="https://access.redhat.com/security/cve/CVE-2025-6032" impact="Important" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2025-6032</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202510550001" comment="podman is earlier than 5:5.4.0-12.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202510550002" comment="podman-plugins is earlier than 5:5.4.0-12.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202510550003" comment="podman-remote is earlier than 5:5.4.0-12.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202510550004" comment="podman-tests is earlier than 5:5.4.0-12.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202510550005" comment="podman-docker is earlier than 5:5.4.0-12.el9_6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20253261" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:3261: nginx:1.22 security update (Moderate)</title>
        <reference ref_id="CVE-2024-7347" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-7347"/>
        <reference ref_id="RHSA-2025:3261" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:3261"/>
        <reference ref_id="ALSA-2025:3261" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-3261.html"/>
        <description>nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.   

Security Fix(es):  

  * nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-03-26"/>
          <updated date="2025-03-26"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <cve public="20240814" href="https://access.redhat.com/security/cve/CVE-2024-7347" impact="Moderate" cwe="CWE-126" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-7347</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236120021" comment="Module nginx:1.22 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261001" comment="nginx is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711002" comment="nginx is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261002" comment="nginx-core is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711006" comment="nginx-core is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261003" comment="nginx-mod-devel is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711010" comment="nginx-mod-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261004" comment="nginx-mod-http-image-filter is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711012" comment="nginx-mod-http-image-filter is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261005" comment="nginx-mod-http-perl is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711014" comment="nginx-mod-http-perl is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261006" comment="nginx-mod-http-xslt-filter is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711016" comment="nginx-mod-http-xslt-filter is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261007" comment="nginx-mod-mail is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711018" comment="nginx-mod-mail is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261008" comment="nginx-mod-stream is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711020" comment="nginx-mod-stream is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261009" comment="nginx-all-modules is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711004" comment="nginx-all-modules is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20253261010" comment="nginx-filesystem is earlier than 1:1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711008" comment="nginx-filesystem is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249193" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9193: python3.12-PyMySQL security update (Moderate)</title>
        <reference ref_id="CVE-2024-36039" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36039"/>
        <reference ref_id="RHSA-2024:9193" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9193"/>
        <reference ref_id="ALSA-2024:9193" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9193.html"/>
        <description>This package contains a pure-Python MySQL client library. The goal of PyMySQL is to be a drop-in replacement for MySQLdb and work on CPython, PyPy, IronPython and Jython.  

Security Fix(es):  

  * python-pymysql: SQL injection if used with untrusted JSON input (CVE-2024-36039)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2282821" id="2282821"></bugzilla>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2024-36039" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L">CVE-2024-36039</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249193001" comment="python3.12-PyMySQL+rsa is earlier than 0:1.1.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249193002" comment="python3.12-PyMySQL+rsa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249193003" comment="python3.12-PyMySQL is earlier than 0:1.1.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249193004" comment="python3.12-PyMySQL is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249195" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9195: cyrus-imapd security update (Moderate)</title>
        <reference ref_id="CVE-2024-34055" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34055"/>
        <reference ref_id="RHSA-2024:9195" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9195"/>
        <reference ref_id="ALSA-2024:9195" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9195.html"/>
        <description>The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.  

Security Fix(es):  

  * cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2290510" id="2290510"></bugzilla>
          <cve public="20240605" href="https://access.redhat.com/security/cve/CVE-2024-34055" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34055</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195001" comment="cyrus-imapd is earlier than 0:3.4.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195002" comment="cyrus-imapd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195003" comment="cyrus-imapd-libs is earlier than 0:3.4.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195004" comment="cyrus-imapd-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195005" comment="cyrus-imapd-utils is earlier than 0:3.4.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195006" comment="cyrus-imapd-utils is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195007" comment="perl-Cyrus is earlier than 0:3.4.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249195008" comment="perl-Cyrus is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202410592" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:10592: thunderbird security update (Important)</title>
        <reference ref_id="CVE-2024-11159" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11159"/>
        <reference ref_id="CVE-2024-11692" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11692"/>
        <reference ref_id="CVE-2024-11694" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11694"/>
        <reference ref_id="CVE-2024-11695" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11695"/>
        <reference ref_id="CVE-2024-11696" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11696"/>
        <reference ref_id="CVE-2024-11697" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11697"/>
        <reference ref_id="CVE-2024-11699" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11699"/>
        <reference ref_id="RHSA-2024:10592" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:10592"/>
        <reference ref_id="ALSA-2024:10592" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-10592.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.  

Security Fix(es):  

  * thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message (CVE-2024-11159)
  * firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims (CVE-2024-11694)
  * firefox: thunderbird: Unhandled Exception in Add-on Signature Verification (CVE-2024-11696)
  * firefox: thunderbird: Select list elements could be shown over another site (CVE-2024-11692)
  * firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 (CVE-2024-11699)
  * firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters (CVE-2024-11695)
  * firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog (CVE-2024-11697)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-12-02"/>
          <updated date="2024-12-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2325896" id="2325896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2328941" id="2328941"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2328943" id="2328943"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2328946" id="2328946"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2328947" id="2328947"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2328948" id="2328948"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2328950" id="2328950"></bugzilla>
          <cve public="20241113" href="https://access.redhat.com/security/cve/CVE-2024-11159" impact="Important" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N">CVE-2024-11159</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-11692" impact="Moderate" cwe="CWE-451" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-11692</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-11694" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-11694</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-11695" impact="Moderate" cwe="CWE-451" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-11695</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-11696" impact="Moderate" cwe="CWE-354" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-11696</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-11697" impact="Low" cwe="CWE-356" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-11697</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-11699" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-11699</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:202410592001" comment="thunderbird is earlier than 0:128.5.0-1.el9_5.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249200" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9200: runc security update (Moderate)</title>
        <reference ref_id="CVE-2024-24788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24788"/>
        <reference ref_id="RHSA-2024:9200" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9200"/>
        <reference ref_id="ALSA-2024:9200" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9200.html"/>
        <description>The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.  

Security Fix(es):  

  * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2279814" id="2279814"></bugzilla>
          <cve public="20240508" href="https://access.redhat.com/security/cve/CVE-2024-24788" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-24788</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249200001" comment="runc is earlier than 4:1.1.13-4.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244762002" comment="runc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249281" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9281: python-jwcrypto security update (Moderate)</title>
        <reference ref_id="CVE-2023-6681" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6681"/>
        <reference ref_id="RHSA-2024:9281" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9281"/>
        <reference ref_id="ALSA-2024:9281" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9281.html"/>
        <description>The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards.  

Security Fix(es):  

  * JWCrypto: denail of service Via specifically crafted JWE (CVE-2023-6681)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2260843" id="2260843"></bugzilla>
          <cve public="20231228" href="https://access.redhat.com/security/cve/CVE-2023-6681" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-6681</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249281001" comment="python3-jwcrypto is earlier than 0:1.5.6-2.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242559002" comment="python3-jwcrypto is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249317" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9317: NetworkManager security update (Low)</title>
        <reference ref_id="CVE-2024-6501" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6501"/>
        <reference ref_id="RHSA-2024:9317" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9317"/>
        <reference ref_id="ALSA-2024:9317" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9317.html"/>
        <description>NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.  

Security Fix(es):  

  * NetworkManager: Denial of Service (CVE-2024-6501)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295734" id="2295734"></bugzilla>
          <cve public="20240704" href="https://access.redhat.com/security/cve/CVE-2024-6501" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2024-6501</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317001" comment="NetworkManager is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317002" comment="NetworkManager is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317003" comment="NetworkManager-adsl is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317004" comment="NetworkManager-adsl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317005" comment="NetworkManager-bluetooth is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317006" comment="NetworkManager-bluetooth is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317007" comment="NetworkManager-cloud-setup is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317008" comment="NetworkManager-cloud-setup is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317009" comment="NetworkManager-libnm is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317010" comment="NetworkManager-libnm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317011" comment="NetworkManager-ovs is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317012" comment="NetworkManager-ovs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317013" comment="NetworkManager-ppp is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317014" comment="NetworkManager-ppp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317015" comment="NetworkManager-team is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317016" comment="NetworkManager-team is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317017" comment="NetworkManager-tui is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317018" comment="NetworkManager-tui is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317019" comment="NetworkManager-wifi is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317020" comment="NetworkManager-wifi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317021" comment="NetworkManager-wwan is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317022" comment="NetworkManager-wwan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317023" comment="NetworkManager-libnm-devel is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317024" comment="NetworkManager-libnm-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317025" comment="NetworkManager-config-connectivity-redhat is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317026" comment="NetworkManager-config-connectivity-redhat is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317027" comment="NetworkManager-config-server is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317028" comment="NetworkManager-config-server is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317029" comment="NetworkManager-dispatcher-routing-rules is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317030" comment="NetworkManager-dispatcher-routing-rules is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317031" comment="NetworkManager-initscripts-updown is earlier than 1:1.48.10-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249317032" comment="NetworkManager-initscripts-updown is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alba:def:20228256" version="635" class="patch">
      <metadata>
        <title>ALBA-2022:8256: qatzip bug fix and enhancement update (Important)</title>
        <reference ref_id="RHBA-2022:8256" source="RHSA" ref_url="https://access.redhat.com/errata/RHBA-2022:8256"/>
        <reference ref_id="CVE-2022-36369" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36369"/>
        <reference ref_id="ALBA-2022:8256" source="ALSA" ref_url="https://errata.almalinux.org/9/ALBA-2022-8256.html"/>
        <description>For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2170784" id="2170784"></bugzilla>
          <cve public="20230217" href="https://access.redhat.com/security/cve/CVE-2022-36369" impact="Important" cwe="CWE-284" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-36369</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alba:tst:20228256007" comment="qatzip is earlier than 0:1.0.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20228256002" comment="qatzip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alba:tst:20228256008" comment="qatzip-devel is earlier than 0:1.0.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20228256004" comment="qatzip-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alba:tst:20228256009" comment="qatzip-libs is earlier than 0:1.0.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20228256006" comment="qatzip-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20224587" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:4587: pcs security update (Important)</title>
        <reference ref_id="ALSA-2022:4587" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-4587.html"/>
        <reference ref_id="RHSA-2022:4587" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:4587"/>
        <reference ref_id="CVE-2022-29970" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29970"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
* sinatra: path traversal possible outside of public_dir when serving static files (CVE-2022-29970)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-05-18"/>
          <updated date="2022-05-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2081096" id="2081096"></bugzilla>
          <cve public="20220502" href="https://access.redhat.com/security/cve/CVE-2022-29970" impact="Important" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-29970</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587005" comment="pcs is earlier than 0:0.11.1-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587007" comment="pcs-snmp is earlier than 0:0.11.1-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20224940" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:4940: xz security update (Important)</title>
        <reference ref_id="ALSA-2022:4940" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-4940.html"/>
        <reference ref_id="RHSA-2022:4940" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:4940"/>
        <reference ref_id="CVE-2022-1271" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1271"/>
        <description>XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-06-08"/>
          <updated date="2022-06-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2073310" id="2073310"></bugzilla>
          <cve public="20220407" href="https://access.redhat.com/security/cve/CVE-2022-1271" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1271</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940001" comment="xz is earlier than 0:5.2.5-8.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940002" comment="xz is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940009" comment="xz-devel is earlier than 0:5.2.5-8.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940004" comment="xz-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940010" comment="xz-libs is earlier than 0:5.2.5-8.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940006" comment="xz-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940007" comment="xz-lzma-compat is earlier than 0:5.2.5-8.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224940008" comment="xz-lzma-compat is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225099" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:5099: grub2, mokutil, shim, and shim-unsigned-x64 security update (Important)</title>
        <reference ref_id="ALSA-2022:5099" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5099.html"/>
        <reference ref_id="RHSA-2022:5099" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5099"/>
        <reference ref_id="CVE-2021-3695" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3695"/>
        <reference ref_id="CVE-2021-3696" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3696"/>
        <reference ref_id="CVE-2021-3697" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3697"/>
        <reference ref_id="CVE-2022-28733" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28733"/>
        <reference ref_id="CVE-2022-28734" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28734"/>
        <reference ref_id="CVE-2022-28735" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28735"/>
        <reference ref_id="CVE-2022-28736" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28736"/>
        <reference ref_id="CVE-2022-28737" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28737"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733)
* grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695)
* grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696)
* grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697)
* grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734)
* grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735)
* grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736)
* shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-06-16"/>
          <updated date="2022-06-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1991685" id="1991685"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1991686" id="1991686"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1991687" id="1991687"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2083339" id="2083339"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090463" id="2090463"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090857" id="2090857"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090899" id="2090899"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092613" id="2092613"></bugzilla>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2021-3695" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2021-3695</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2021-3696" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L">CVE-2021-3696</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2021-3697" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2021-3697</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2022-28733" impact="Important" cwe="CWE-191" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-28733</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2022-28734" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2022-28734</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2022-28735" impact="Moderate" cwe="CWE-829" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-28735</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2022-28736" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-28736</cve>
          <cve public="20220607" href="https://access.redhat.com/security/cve/CVE-2022-28737" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H">CVE-2022-28737</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099037" comment="grub2-efi-aa64 is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099004" comment="grub2-efi-aa64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099038" comment="grub2-efi-aa64-cdboot is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099006" comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099039" comment="grub2-efi-x64 is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099010" comment="grub2-efi-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099040" comment="grub2-efi-x64-cdboot is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099012" comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099041" comment="grub2-pc is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099016" comment="grub2-pc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099042" comment="grub2-ppc64le is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099020" comment="grub2-ppc64le is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099043" comment="grub2-tools is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099024" comment="grub2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099044" comment="grub2-tools-efi is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099026" comment="grub2-tools-efi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099045" comment="grub2-tools-extra is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099028" comment="grub2-tools-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099046" comment="grub2-tools-minimal is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099030" comment="grub2-tools-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099047" comment="shim-unsigned-x64 is earlier than 0:15.6-1.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099032" comment="shim-unsigned-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099048" comment="shim-aa64 is earlier than 0:15.6-1.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099034" comment="shim-aa64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099049" comment="shim-x64 is earlier than 0:15.6-1.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099036" comment="shim-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099050" comment="grub2-common is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099002" comment="grub2-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099051" comment="grub2-efi-aa64-modules is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099008" comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099052" comment="grub2-efi-x64-modules is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099014" comment="grub2-efi-x64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099053" comment="grub2-pc-modules is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099018" comment="grub2-pc-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099054" comment="grub2-ppc64le-modules is earlier than 1:2.06-27.el9_0.7.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099022" comment="grub2-ppc64le-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225242" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:5242: vim security update (Moderate)</title>
        <reference ref_id="ALSA-2022:5242" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5242.html"/>
        <reference ref_id="RHSA-2022:5242" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5242"/>
        <reference ref_id="CVE-2022-0554" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0554"/>
        <reference ref_id="CVE-2022-0943" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0943"/>
        <reference ref_id="CVE-2022-1154" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1154"/>
        <reference ref_id="CVE-2022-1420" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1420"/>
        <reference ref_id="CVE-2022-1621" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1621"/>
        <reference ref_id="CVE-2022-1629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1629"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)
* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)
* vim: Out-of-range Pointer Offset (CVE-2022-1420)
* vim: heap buffer overflow (CVE-2022-1621)
* vim: buffer over-read (CVE-2022-1629)
* vim: use after free in utf_ptr2char (CVE-2022-1154)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-01"/>
          <updated date="2022-07-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2058483" id="2058483"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064064" id="2064064"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073013" id="2073013"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2077734" id="2077734"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2083924" id="2083924"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2083931" id="2083931"></bugzilla>
          <cve public="20220110" href="https://access.redhat.com/security/cve/CVE-2022-0554" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-0554</cve>
          <cve public="20220314" href="https://access.redhat.com/security/cve/CVE-2022-0943" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-0943</cve>
          <cve public="20220406" href="https://access.redhat.com/security/cve/CVE-2022-1154" impact="Low" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1154</cve>
          <cve public="20220421" href="https://access.redhat.com/security/cve/CVE-2022-1420" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H">CVE-2022-1420</cve>
          <cve public="20220510" href="https://access.redhat.com/security/cve/CVE-2022-1621" impact="Moderate" cvss3="CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H">CVE-2022-1621</cve>
          <cve public="20220510" href="https://access.redhat.com/security/cve/CVE-2022-1629" impact="Moderate" cvss3="CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2022-1629</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242001" comment="vim-X11 is earlier than 2:8.2.2637-16.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242002" comment="vim-X11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242003" comment="vim-common is earlier than 2:8.2.2637-16.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242004" comment="vim-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242005" comment="vim-enhanced is earlier than 2:8.2.2637-16.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242006" comment="vim-enhanced is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242009" comment="vim-minimal is earlier than 2:8.2.2637-16.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242010" comment="vim-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242007" comment="vim-filesystem is earlier than 2:8.2.2637-16.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242008" comment="vim-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225244" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5244: expat security update (Moderate)</title>
        <reference ref_id="ALSA-2022:5244" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5244.html"/>
        <reference ref_id="RHSA-2022:5244" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5244"/>
        <reference ref_id="CVE-2022-25313" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25313"/>
        <reference ref_id="CVE-2022-25314" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25314"/>
        <description>Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: stack exhaustion in doctype parsing (CVE-2022-25313)
* expat: integer overflow in copyString() (CVE-2022-25314)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-01"/>
          <updated date="2022-07-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2056350" id="2056350"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2056354" id="2056354"></bugzilla>
          <cve public="20220219" href="https://access.redhat.com/security/cve/CVE-2022-25313" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-25313</cve>
          <cve public="20220219" href="https://access.redhat.com/security/cve/CVE-2022-25314" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-25314</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244001" comment="expat is earlier than 0:2.2.10-12.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244002" comment="expat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244003" comment="expat-devel is earlier than 0:2.2.10-12.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244004" comment="expat-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225249" version="640" class="patch">
      <metadata>
        <title>ALSA-2022:5249: kernel security and bug fix update (Important)</title>
        <reference ref_id="ALSA-2022:5249" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5249.html"/>
        <reference ref_id="RHSA-2022:5249" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5249"/>
        <reference ref_id="CVE-2022-1012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1012"/>
        <reference ref_id="CVE-2022-1729" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1729"/>
        <reference ref_id="CVE-2022-1966" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1966"/>
        <reference ref_id="CVE-2022-27666" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27666"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)
* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643)
* SR-IOV performance &gt; 50% degradation (BZ#2074830)
* fix data corruption caused by dm-integrity (BZ#2082187)
* SCTP client-side peeloff issues [almalinux-9] (BZ#2084044)
* TCP connection fails in a asymmetric routing situation (BZ#2085480)
* Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963)
* spec: Fix separate tools build (BZ#2090852)
* call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered (BZ#2092255)
* Mark ThunderX NIC driver as unmaintained (BZ#2092638)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-01"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2061633" id="2061633"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064604" id="2064604"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2086753" id="2086753"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092427" id="2092427"></bugzilla>
          <cve public="20220502" href="https://access.redhat.com/security/cve/CVE-2022-1012" impact="Important" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H">CVE-2022-1012</cve>
          <cve public="20220520" href="https://access.redhat.com/security/cve/CVE-2022-1729" impact="Important" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1729</cve>
          <cve public="20220531" href="https://access.redhat.com/security/cve/CVE-2022-1966" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1966</cve>
          <cve public="20220311" href="https://access.redhat.com/security/cve/CVE-2022-27666" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-27666</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249001" comment="bpftool is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249003" comment="kernel is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249007" comment="kernel-core is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249009" comment="kernel-cross-headers is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249011" comment="kernel-debug is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249013" comment="kernel-debug-core is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249015" comment="kernel-debug-devel is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249019" comment="kernel-debug-modules is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249023" comment="kernel-devel is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249025" comment="kernel-devel-matched is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249029" comment="kernel-headers is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249031" comment="kernel-modules is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249033" comment="kernel-modules-extra is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249035" comment="kernel-tools is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249057" comment="kernel-tools-libs is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249058" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249059" comment="kernel-zfcpdump is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249060" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249061" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249062" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249063" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249064" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249053" comment="perf is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249055" comment="python3-perf is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249027" comment="kernel-doc is earlier than 0:5.14.0-70.17.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225252" version="634" class="patch">
      <metadata>
        <title>ALSA-2022:5252: libarchive security update (Moderate)</title>
        <reference ref_id="ALSA-2022:5252" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5252.html"/>
        <reference ref_id="RHSA-2022:5252" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5252"/>
        <reference ref_id="CVE-2022-26280" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26280"/>
        <description>The libarchive programming library can create and read several different
streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images.
Libarchive is used notably in the bsdtar utility, scripting language bindings
such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: an out-of-bounds read via the component zipx_lzma_alone_init
(CVE-2022-26280)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-01"/>
          <updated date="2022-07-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2071931" id="2071931"></bugzilla>
          <cve public="20220329" href="https://access.redhat.com/security/cve/CVE-2022-26280" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H">CVE-2022-26280</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252001" comment="bsdtar is earlier than 0:3.5.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252002" comment="bsdtar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252007" comment="libarchive is earlier than 0:3.5.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252004" comment="libarchive is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252008" comment="libarchive-devel is earlier than 0:3.5.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252006" comment="libarchive-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225257" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5257: libinput security update (Moderate)</title>
        <reference ref_id="ALSA-2022:5257" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5257.html"/>
        <reference ref_id="RHSA-2022:5257" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5257"/>
        <reference ref_id="CVE-2022-1215" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1215"/>
        <description>libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-06-30"/>
          <updated date="2022-06-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2074952" id="2074952"></bugzilla>
          <cve public="20220420" href="https://access.redhat.com/security/cve/CVE-2022-1215" impact="Moderate" cwe="CWE-134" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1215</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225257001" comment="libinput is earlier than 0:1.19.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225257002" comment="libinput is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225257003" comment="libinput-devel is earlier than 0:1.19.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225257004" comment="libinput-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225257007" comment="libinput-utils is earlier than 0:1.19.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225257006" comment="libinput-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225263" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5263: qemu-kvm security and bug fix update (Moderate)</title>
        <reference ref_id="ALSA-2022:5263" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5263.html"/>
        <reference ref_id="RHSA-2022:5263" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5263"/>
        <reference ref_id="CVE-2022-26353" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26353"/>
        <reference ref_id="CVE-2022-26354" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26354"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353)
* QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* AlmaLinux 9.0 guest with vsock device migration failed from AlmaLinux 9.0 &gt; AlmaLinux 8.6 (BZ#2071102)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-01"/>
          <updated date="2022-07-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2063197" id="2063197"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2063257" id="2063257"></bugzilla>
          <cve public="20220308" href="https://access.redhat.com/security/cve/CVE-2022-26353" impact="Moderate" cwe="CWE-401-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2022-26353</cve>
          <cve public="20220228" href="https://access.redhat.com/security/cve/CVE-2022-26354" impact="Low" cwe="CWE-772" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L">CVE-2022-26354</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263001" comment="qemu-guest-agent is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263003" comment="qemu-img is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263045" comment="qemu-kvm is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263046" comment="qemu-kvm-audio-pa is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263047" comment="qemu-kvm-block-curl is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263048" comment="qemu-kvm-block-rbd is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263049" comment="qemu-kvm-common is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263050" comment="qemu-kvm-core is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263051" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263052" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263053" comment="qemu-kvm-device-display-virtio-gpu-gl is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263022" comment="qemu-kvm-device-display-virtio-gpu-gl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263054" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263055" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263026" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263056" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263057" comment="qemu-kvm-device-display-virtio-vga-gl is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263030" comment="qemu-kvm-device-display-virtio-vga-gl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263058" comment="qemu-kvm-device-usb-host is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263059" comment="qemu-kvm-device-usb-redirect is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263060" comment="qemu-kvm-docs is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263061" comment="qemu-kvm-tools is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263062" comment="qemu-kvm-ui-egl-headless is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263063" comment="qemu-kvm-ui-opengl is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263064" comment="qemu-pr-helper is earlier than 17:6.2.0-11.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225267" version="639" class="patch">
      <metadata>
        <title>ALSA-2022:5267: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="ALSA-2022:5267" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5267.html"/>
        <reference ref_id="RHSA-2022:5267" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5267"/>
        <reference ref_id="CVE-2022-1012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1012"/>
        <reference ref_id="CVE-2022-1729" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1729"/>
        <reference ref_id="CVE-2022-1966" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1966"/>
        <reference ref_id="CVE-2022-27666" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27666"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)
* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest AlmaLinux-9.0.z1 Batch (BZ#2089492)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-06-28"/>
          <updated date="2022-06-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2061633" id="2061633"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064604" id="2064604"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2086753" id="2086753"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092427" id="2092427"></bugzilla>
          <cve public="20220502" href="https://access.redhat.com/security/cve/CVE-2022-1012" impact="Important" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H">CVE-2022-1012</cve>
          <cve public="20220520" href="https://access.redhat.com/security/cve/CVE-2022-1729" impact="Important" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1729</cve>
          <cve public="20220531" href="https://access.redhat.com/security/cve/CVE-2022-1966" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1966</cve>
          <cve public="20220311" href="https://access.redhat.com/security/cve/CVE-2022-27666" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-27666</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267025" comment="kernel-rt is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267026" comment="kernel-rt-core is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267027" comment="kernel-rt-debug is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267028" comment="kernel-rt-debug-core is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267029" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267030" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267031" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267032" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267033" comment="kernel-rt-devel is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267034" comment="kernel-rt-kvm is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267035" comment="kernel-rt-modules is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267036" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-70.17.1.rt21.89.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225695" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5695: java-11-openjdk security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="ALSA-2022:5695" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5695.html"/>
        <reference ref_id="RHSA-2022:5695" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5695"/>
        <reference ref_id="CVE-2022-21540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21540"/>
        <reference ref_id="CVE-2022-21541" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21541"/>
        <reference ref_id="CVE-2022-34169" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34169"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084777)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [almalinux-9, openjdk-11] (BZ#2099915)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [almalinux-9, openjdk-11] (BZ#2107866)
* Revert to disabling system security properties and FIPS mode support together [almalinux-9, openjdk-11] (BZ#2107868)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-25"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2108540" id="2108540"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108543" id="2108543"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108554" id="2108554"></bugzilla>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21540" impact="Moderate" cwe="CWE-402" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-21540</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21541" impact="Moderate" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-21541</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-34169" impact="Important" cwe="CWE-192" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-34169</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695001" comment="java-11-openjdk is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695003" comment="java-11-openjdk-demo is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695009" comment="java-11-openjdk-devel is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695017" comment="java-11-openjdk-headless is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695027" comment="java-11-openjdk-jmods is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695035" comment="java-11-openjdk-src is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225695045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.16.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225709" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5709: java-1.8.0-openjdk security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="ALSA-2022:5709" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5709.html"/>
        <reference ref_id="RHSA-2022:5709" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5709"/>
        <reference ref_id="CVE-2022-21540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21540"/>
        <reference ref_id="CVE-2022-21541" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21541"/>
        <reference ref_id="CVE-2022-34169" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34169"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084776)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [almalinux-9, openjdk-8] (BZ#2099916)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [almalinux-9, openjdk-8] (BZ#2107956)
* Revert to disabling system security properties and FIPS mode support together [almalinux-9, openjdk-8] (BZ#2107958)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-25"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2108540" id="2108540"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108543" id="2108543"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108554" id="2108554"></bugzilla>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21540" impact="Moderate" cwe="CWE-402" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-21540</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21541" impact="Moderate" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-21541</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-34169" impact="Important" cwe="CWE-192" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-34169</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225709025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.342.b07-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225736" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:5736: java-17-openjdk security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="ALSA-2022:5736" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5736.html"/>
        <reference ref_id="RHSA-2022:5736" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5736"/>
        <reference ref_id="CVE-2022-21540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21540"/>
        <reference ref_id="CVE-2022-21541" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21541"/>
        <reference ref_id="CVE-2022-21549" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21549"/>
        <reference ref_id="CVE-2022-34169" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34169"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084779)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Previous AlmaLinux builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with AlmaLinux builds of OpenJDK. (BZ#2099919)
* With previous AlmaLinux builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2105395)
* With the release of AlmaLinux, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.AlmaLinux.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in AlmaLinux. (BZ#2107941)
* Previous AlmaLinux builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2107943)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-07-27"/>
          <updated date="2022-07-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2108540" id="2108540"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108543" id="2108543"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108547" id="2108547"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108554" id="2108554"></bugzilla>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21540" impact="Moderate" cwe="CWE-402" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-21540</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21541" impact="Moderate" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-21541</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21549" impact="Moderate" cwe="CWE-1068" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21549</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-34169" impact="Important" cwe="CWE-192" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-34169</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736001" comment="java-17-openjdk is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736003" comment="java-17-openjdk-demo is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736009" comment="java-17-openjdk-devel is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736017" comment="java-17-openjdk-headless is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736027" comment="java-17-openjdk-jmods is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736035" comment="java-17-openjdk-src is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225736045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.4.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225799" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5799: go-toolset and golang security and bug fix update (Important)</title>
        <reference ref_id="ALSA-2022:5799" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5799.html"/>
        <reference ref_id="RHSA-2022:5799" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5799"/>
        <reference ref_id="CVE-2022-1705" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1705"/>
        <reference ref_id="CVE-2022-1962" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1962"/>
        <reference ref_id="CVE-2022-28131" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28131"/>
        <reference ref_id="CVE-2022-30630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30630"/>
        <reference ref_id="CVE-2022-30631" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30631"/>
        <reference ref_id="CVE-2022-30632" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30632"/>
        <reference ref_id="CVE-2022-30633" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30633"/>
        <reference ref_id="CVE-2022-30635" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30635"/>
        <reference ref_id="CVE-2022-32148" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32148"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. 
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Clean up dist-git patches (BZ#2109174)
* Update Go to version 1.17.12 (BZ#2109183)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-01"/>
          <updated date="2022-08-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2107342" id="2107342"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107371" id="2107371"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107374" id="2107374"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107376" id="2107376"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107383" id="2107383"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107386" id="2107386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107388" id="2107388"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107390" id="2107390"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107392" id="2107392"></bugzilla>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-1705" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-1705</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-1962" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1962</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-28131" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-28131</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30630" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30630</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30631" impact="Important" cwe="CWE-1325" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30631</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30632" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30632</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30633" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30633</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30635" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30635</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-32148" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-32148</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799017" comment="golang is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799018" comment="golang-bin is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799019" comment="golang-race is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799010" comment="golang-race is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799020" comment="golang-docs is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799021" comment="golang-misc is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799022" comment="golang-src is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799023" comment="golang-tests is earlier than 0:1.17.12-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225904" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5904: php security update (Important)</title>
        <reference ref_id="ALSA-2022:5904" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5904.html"/>
        <reference ref_id="RHSA-2022:5904" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5904"/>
        <reference ref_id="CVE-2022-31626" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31626"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-04"/>
          <updated date="2022-08-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2098523" id="2098523"></bugzilla>
          <cve public="20220516" href="https://access.redhat.com/security/cve/CVE-2022-31626" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-31626</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904001" comment="php is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904002" comment="php is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904003" comment="php-bcmath is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904004" comment="php-bcmath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904005" comment="php-cli is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904006" comment="php-cli is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904007" comment="php-common is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904008" comment="php-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904009" comment="php-dba is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904010" comment="php-dba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904011" comment="php-dbg is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904012" comment="php-dbg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904013" comment="php-devel is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904014" comment="php-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904015" comment="php-embedded is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904016" comment="php-embedded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904017" comment="php-enchant is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904018" comment="php-enchant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904019" comment="php-ffi is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904020" comment="php-ffi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904021" comment="php-fpm is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904022" comment="php-fpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904023" comment="php-gd is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904024" comment="php-gd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904025" comment="php-gmp is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904026" comment="php-gmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904027" comment="php-intl is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904028" comment="php-intl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904029" comment="php-ldap is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904030" comment="php-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904031" comment="php-mbstring is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904032" comment="php-mbstring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904033" comment="php-mysqlnd is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904034" comment="php-mysqlnd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904035" comment="php-odbc is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904036" comment="php-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904037" comment="php-opcache is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904038" comment="php-opcache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904039" comment="php-pdo is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904040" comment="php-pdo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904041" comment="php-pgsql is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904042" comment="php-pgsql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904043" comment="php-process is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904044" comment="php-process is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904045" comment="php-snmp is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904046" comment="php-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904047" comment="php-soap is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904048" comment="php-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904049" comment="php-xml is earlier than 0:8.0.13-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904050" comment="php-xml is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225942" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5942: vim security update (Moderate)</title>
        <reference ref_id="ALSA-2022:5942" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5942.html"/>
        <reference ref_id="RHSA-2022:5942" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5942"/>
        <reference ref_id="CVE-2022-1785" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1785"/>
        <reference ref_id="CVE-2022-1897" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1897"/>
        <reference ref_id="CVE-2022-1927" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1927"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-09"/>
          <updated date="2022-08-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2088689" id="2088689"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2091682" id="2091682"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2091687" id="2091687"></bugzilla>
          <cve public="20220519" href="https://access.redhat.com/security/cve/CVE-2022-1785" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2022-1785</cve>
          <cve public="20220525" href="https://access.redhat.com/security/cve/CVE-2022-1897" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1897</cve>
          <cve public="20220522" href="https://access.redhat.com/security/cve/CVE-2022-1927" impact="Moderate" cwe="CWE-126" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1927</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225942001" comment="vim-X11 is earlier than 2:8.2.2637-16.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242002" comment="vim-X11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225942003" comment="vim-common is earlier than 2:8.2.2637-16.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242004" comment="vim-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225942005" comment="vim-enhanced is earlier than 2:8.2.2637-16.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242006" comment="vim-enhanced is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225942009" comment="vim-minimal is earlier than 2:8.2.2637-16.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242010" comment="vim-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225942007" comment="vim-filesystem is earlier than 2:8.2.2637-16.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242008" comment="vim-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20225948" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:5948: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="ALSA-2022:5948" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-5948.html"/>
        <reference ref_id="RHSA-2022:5948" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:5948"/>
        <reference ref_id="CVE-2021-46659" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46659"/>
        <reference ref_id="CVE-2021-46661" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46661"/>
        <reference ref_id="CVE-2021-46663" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46663"/>
        <reference ref_id="CVE-2021-46664" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46664"/>
        <reference ref_id="CVE-2021-46665" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46665"/>
        <reference ref_id="CVE-2021-46668" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46668"/>
        <reference ref_id="CVE-2021-46669" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46669"/>
        <reference ref_id="CVE-2022-24048" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24048"/>
        <reference ref_id="CVE-2022-24050" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24050"/>
        <reference ref_id="CVE-2022-24051" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24051"/>
        <reference ref_id="CVE-2022-24052" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24052"/>
        <reference ref_id="CVE-2022-27376" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27376"/>
        <reference ref_id="CVE-2022-27377" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27377"/>
        <reference ref_id="CVE-2022-27378" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27378"/>
        <reference ref_id="CVE-2022-27379" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27379"/>
        <reference ref_id="CVE-2022-27380" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27380"/>
        <reference ref_id="CVE-2022-27381" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27381"/>
        <reference ref_id="CVE-2022-27382" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27382"/>
        <reference ref_id="CVE-2022-27383" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27383"/>
        <reference ref_id="CVE-2022-27384" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27384"/>
        <reference ref_id="CVE-2022-27386" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27386"/>
        <reference ref_id="CVE-2022-27387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27387"/>
        <reference ref_id="CVE-2022-27444" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27444"/>
        <reference ref_id="CVE-2022-27445" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27445"/>
        <reference ref_id="CVE-2022-27446" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27446"/>
        <reference ref_id="CVE-2022-27447" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27447"/>
        <reference ref_id="CVE-2022-27448" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27448"/>
        <reference ref_id="CVE-2022-27449" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27449"/>
        <reference ref_id="CVE-2022-27451" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27451"/>
        <reference ref_id="CVE-2022-27452" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27452"/>
        <reference ref_id="CVE-2022-27455" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27455"/>
        <reference ref_id="CVE-2022-27456" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27456"/>
        <reference ref_id="CVE-2022-27457" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27457"/>
        <reference ref_id="CVE-2022-27458" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27458"/>
        <reference ref_id="CVE-2022-31622" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31622"/>
        <reference ref_id="CVE-2022-31623" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31623"/>
        <description>MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. 
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-09"/>
          <updated date="2022-08-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2049302" id="2049302"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2050017" id="2050017"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2050022" id="2050022"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2050024" id="2050024"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2050026" id="2050026"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2050032" id="2050032"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2050034" id="2050034"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2068211" id="2068211"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2068233" id="2068233"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2068234" id="2068234"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2069833" id="2069833"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074817" id="2074817"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074947" id="2074947"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074949" id="2074949"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074951" id="2074951"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074966" id="2074966"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074981" id="2074981"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074987" id="2074987"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074996" id="2074996"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074999" id="2074999"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075005" id="2075005"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075006" id="2075006"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075691" id="2075691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075692" id="2075692"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075693" id="2075693"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075694" id="2075694"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075695" id="2075695"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075696" id="2075696"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075697" id="2075697"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075699" id="2075699"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075700" id="2075700"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075701" id="2075701"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2076144" id="2076144"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2076145" id="2076145"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092354" id="2092354"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092360" id="2092360"></bugzilla>
          <cve public="20210510" href="https://access.redhat.com/security/cve/CVE-2021-46659" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46659</cve>
          <cve public="20210525" href="https://access.redhat.com/security/cve/CVE-2021-46661" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46661</cve>
          <cve public="20210813" href="https://access.redhat.com/security/cve/CVE-2021-46663" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46663</cve>
          <cve public="20210524" href="https://access.redhat.com/security/cve/CVE-2021-46664" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46664</cve>
          <cve public="20210510" href="https://access.redhat.com/security/cve/CVE-2021-46665" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46665</cve>
          <cve public="20210527" href="https://access.redhat.com/security/cve/CVE-2021-46668" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46668</cve>
          <cve public="20210510" href="https://access.redhat.com/security/cve/CVE-2021-46669" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2021-46669</cve>
          <cve public="20220218" href="https://access.redhat.com/security/cve/CVE-2022-24048" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-24048</cve>
          <cve public="20220218" href="https://access.redhat.com/security/cve/CVE-2022-24050" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-24050</cve>
          <cve public="20220218" href="https://access.redhat.com/security/cve/CVE-2022-24051" impact="Moderate" cwe="CWE-20-&gt;CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-24051</cve>
          <cve public="20220218" href="https://access.redhat.com/security/cve/CVE-2022-24052" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-24052</cve>
          <cve public="20201109" href="https://access.redhat.com/security/cve/CVE-2022-27376" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27376</cve>
          <cve public="20210730" href="https://access.redhat.com/security/cve/CVE-2022-27377" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27377</cve>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-27378" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27378</cve>
          <cve public="20210813" href="https://access.redhat.com/security/cve/CVE-2022-27379" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27379</cve>
          <cve public="20210623" href="https://access.redhat.com/security/cve/CVE-2022-27380" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27380</cve>
          <cve public="20210701" href="https://access.redhat.com/security/cve/CVE-2022-27381" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27381</cve>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-27382" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27382</cve>
          <cve public="20210809" href="https://access.redhat.com/security/cve/CVE-2022-27383" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27383</cve>
          <cve public="20210630" href="https://access.redhat.com/security/cve/CVE-2022-27384" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27384</cve>
          <cve public="20191111" href="https://access.redhat.com/security/cve/CVE-2022-27386" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27386</cve>
          <cve public="20210401" href="https://access.redhat.com/security/cve/CVE-2022-27387" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27387</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-27444" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27444</cve>
          <cve public="20190506" href="https://access.redhat.com/security/cve/CVE-2022-27445" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27445</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-27446" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27446</cve>
          <cve public="20201109" href="https://access.redhat.com/security/cve/CVE-2022-27447" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27447</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-27448" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27448</cve>
          <cve public="20201109" href="https://access.redhat.com/security/cve/CVE-2022-27449" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27449</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-27451" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27451</cve>
          <cve public="20201109" href="https://access.redhat.com/security/cve/CVE-2022-27452" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27452</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-27455" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27455</cve>
          <cve public="20201109" href="https://access.redhat.com/security/cve/CVE-2022-27456" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27456</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-27457" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27457</cve>
          <cve public="20201109" href="https://access.redhat.com/security/cve/CVE-2022-27458" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27458</cve>
          <cve public="20210907" href="https://access.redhat.com/security/cve/CVE-2022-31622" impact="Moderate" cwe="CWE-404" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-31622</cve>
          <cve public="20210907" href="https://access.redhat.com/security/cve/CVE-2022-31623" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-31623</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948001" comment="mariadb is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948002" comment="mariadb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948003" comment="mariadb-backup is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948004" comment="mariadb-backup is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948005" comment="mariadb-common is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948006" comment="mariadb-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948007" comment="mariadb-devel is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948008" comment="mariadb-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948009" comment="mariadb-embedded is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948010" comment="mariadb-embedded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948011" comment="mariadb-embedded-devel is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948012" comment="mariadb-embedded-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948013" comment="mariadb-errmsg is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948014" comment="mariadb-errmsg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948015" comment="mariadb-gssapi-server is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948016" comment="mariadb-gssapi-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948017" comment="mariadb-oqgraph-engine is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948018" comment="mariadb-oqgraph-engine is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948019" comment="mariadb-pam is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948020" comment="mariadb-pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948021" comment="mariadb-server is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948022" comment="mariadb-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948023" comment="mariadb-server-galera is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948024" comment="mariadb-server-galera is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948025" comment="mariadb-server-utils is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948026" comment="mariadb-server-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948027" comment="mariadb-test is earlier than 3:10.5.16-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948028" comment="mariadb-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226002" version="638" class="patch">
      <metadata>
        <title>ALSA-2022:6002: kernel-rt security and bug fix update (Moderate)</title>
        <reference ref_id="ALSA-2022:6002" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6002.html"/>
        <reference ref_id="RHSA-2022:6002" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6002"/>
        <reference ref_id="CVE-2022-0494" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0494"/>
        <reference ref_id="CVE-2022-1055" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1055"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* information leak in scsi_ioctl() (CVE-2022-0494)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* update RT source tree to the latest AlmaLinux-9.0.z2 Batch (BZ#2105450)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-09"/>
          <updated date="2022-08-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2039448" id="2039448"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2070220" id="2070220"></bugzilla>
          <cve public="20220216" href="https://access.redhat.com/security/cve/CVE-2022-0494" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2022-0494</cve>
          <cve public="20220131" href="https://access.redhat.com/security/cve/CVE-2022-1055" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2022-1055</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002024" comment="kernel-rt is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002025" comment="kernel-rt-core is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002026" comment="kernel-rt-debug is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002032" comment="kernel-rt-devel is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002033" comment="kernel-rt-kvm is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002034" comment="kernel-rt-modules is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226002035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-70.22.1.rt21.94.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226003" version="642" class="patch">
      <metadata>
        <title>ALSA-2022:6003: kernel security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="ALSA-2022:6003" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6003.html"/>
        <reference ref_id="RHSA-2022:6003" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6003"/>
        <reference ref_id="CVE-2022-0494" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0494"/>
        <reference ref_id="CVE-2022-1055" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1055"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* information leak in scsi_ioctl() (CVE-2022-0494)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Power9 - LPAR fails to boot in shared processing mode and call traces are seen [Hash] (BZ#2092248)
* Hard lockups are observed while running stress-ng and LPAR hangs (BZ#2092253)
* FIPS module identification via name and version (BZ#2093384)
* gfs2: File corruption with large writes when memory is tight (BZ#2097306)
* i/o on initiator stuck when network is disrupted (4.18.0-372.9.1.el8.x86_64) (BZ#2098251)
* AlmaLinux 9.1 doesn't support 3rd SATA (BZ#2099740)
* Guest call trace when reboot after postcopy migration with high stress workload (BZ#2100903)
* Oops or general protection fault with RIP decode_attr_security_label at decode_getfattr_attrs (BZ#2101854)
* Oops as BUG: unable to handle page fault as free of uninitialized nfs4_label on nfs referral lookup (BZ#2101858)
* lpar crash with Oops: Kernel access of bad area, sig: 11 [#1] when changing mtu of a bond interface (P10/ ibmvnic/ Haleakala) (BZ#2103085)
* OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2109974)
Enhancement(s):
* iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2105326)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-09"/>
          <updated date="2022-08-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2039448" id="2039448"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2070220" id="2070220"></bugzilla>
          <cve public="20220216" href="https://access.redhat.com/security/cve/CVE-2022-0494" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2022-0494</cve>
          <cve public="20220131" href="https://access.redhat.com/security/cve/CVE-2022-1055" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2022-1055</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003001" comment="bpftool is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003003" comment="kernel is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003007" comment="kernel-core is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003009" comment="kernel-cross-headers is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003011" comment="kernel-debug is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003013" comment="kernel-debug-core is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003015" comment="kernel-debug-devel is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003019" comment="kernel-debug-modules is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003023" comment="kernel-devel is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003025" comment="kernel-devel-matched is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003029" comment="kernel-headers is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003031" comment="kernel-modules is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003033" comment="kernel-modules-extra is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003035" comment="kernel-tools is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003056" comment="kernel-tools-libs is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003057" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003058" comment="kernel-zfcpdump is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003059" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003060" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003061" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003062" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003063" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003053" comment="perf is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003055" comment="python3-perf is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226003027" comment="kernel-doc is earlier than 0:5.14.0-70.22.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226043" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:6043: .NET 6.0 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="ALSA-2022:6043" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6043.html"/>
        <reference ref_id="RHSA-2022:6043" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6043"/>
        <reference ref_id="CVE-2022-34716" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34716"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.108 and .NET Runtime 6.0.8.
Security Fix(es):
* dotnet: External Entity Injection during XML signature verification (CVE-2022-34716)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-10"/>
          <updated date="2022-08-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2115183" id="2115183"></bugzilla>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-34716" impact="Moderate" cwe="CWE-611" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L">CVE-2022-34716</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043007" comment="dotnet-host is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043009" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043011" comment="dotnet-runtime-6.0 is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043013" comment="dotnet-sdk-6.0 is earlier than 0:6.0.108-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043015" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.108-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043017" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.8-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043019" comment="dotnet-templates-6.0 is earlier than 0:6.0.108-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226043021" comment="netstandard-targeting-pack-2.1 is earlier than 0:6.0.108-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226157" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6157: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2022:6157" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6157"/>
        <reference ref_id="CVE-2022-32206" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32206"/>
        <reference ref_id="CVE-2022-32207" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32207"/>
        <reference ref_id="CVE-2022-32208" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32208"/>
        <reference ref_id="ALSA-2022:6157" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6157.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP compression denial of service (CVE-2022-32206)
* curl: Unpreserved file permissions (CVE-2022-32207)
* curl: FTP-KRB bad message verification (CVE-2022-32208)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-24"/>
          <updated date="2022-08-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2099300" id="2099300"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2099305" id="2099305"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2099306" id="2099306"></bugzilla>
          <cve public="20220627" href="https://access.redhat.com/security/cve/CVE-2022-32206" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-32206</cve>
          <cve public="20220627" href="https://access.redhat.com/security/cve/CVE-2022-32207" impact="Moderate" cwe="CWE-281" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-32207</cve>
          <cve public="20220627" href="https://access.redhat.com/security/cve/CVE-2022-32208" impact="Moderate" cwe="CWE-924" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2022-32208</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226157001" comment="curl is earlier than 0:7.76.1-14.el9_0.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226157003" comment="curl-minimal is earlier than 0:7.76.1-14.el9_0.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226157010" comment="libcurl is earlier than 0:7.76.1-14.el9_0.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226157011" comment="libcurl-devel is earlier than 0:7.76.1-14.el9_0.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226157012" comment="libcurl-minimal is earlier than 0:7.76.1-14.el9_0.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226224" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:6224: openssl security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:6224" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6224"/>
        <reference ref_id="CVE-2022-1292" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1292"/>
        <reference ref_id="CVE-2022-1343" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1343"/>
        <reference ref_id="CVE-2022-1473" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1473"/>
        <reference ref_id="CVE-2022-2068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2068"/>
        <reference ref_id="CVE-2022-2097" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2097"/>
        <reference ref_id="ALSA-2022:6224" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6224.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: c_rehash script allows command injection (CVE-2022-1292)
* openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS (CVE-2022-1343)
* openssl: OPENSSL_LH_flush() breaks reuse of memory (CVE-2022-1473)
* openssl: the c_rehash script allows command injection (CVE-2022-2068)
* openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* openssl occasionally sends internal error to gnutls when using FFDHE (BZ#2080323)
* openssl req defaults to 3DES (BZ#2085499)
* OpenSSL accepts custom elliptic curve parameters when p is large [almalinux-9] (BZ#2085508)
* OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode (BZ#2085521)
* openssl s_server -groups secp256k1 in FIPS fails because X25519/X448 (BZ#2086554)
* Converting FIPS power-on self test to KAT (BZ#2086866)
* Small RSA keys work for some operations in FIPS mode (BZ#2091938)
* FIPS provider doesn't block RSA encryption for key transport (BZ#2091977)
* OpenSSL testsuite certificates expired (BZ#2095696)
* [IBM 9.1 HW OPT] POWER10 performance enhancements for cryptography: OpenSSL (BZ#2103044)
* [FIPS lab review] self-test (BZ#2112978)
* [FIPS lab review] DH tuning (BZ#2115856)
* [FIPS lab review] EC tuning (BZ#2115857)
* [FIPS lab review] RSA tuning (BZ#2115858)
* [FIPS lab review] RAND tuning (BZ#2115859)
* [FIPS lab review] zeroization (BZ#2115861)
* [FIPS lab review] HKDF limitations (BZ#2118388)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-08-30"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2081494" id="2081494"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2087911" id="2087911"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2087913" id="2087913"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2097310" id="2097310"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2104905" id="2104905"></bugzilla>
          <cve public="20220503" href="https://access.redhat.com/security/cve/CVE-2022-1292" impact="Moderate" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1292</cve>
          <cve public="20220503" href="https://access.redhat.com/security/cve/CVE-2022-1343" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2022-1343</cve>
          <cve public="20220503" href="https://access.redhat.com/security/cve/CVE-2022-1473" impact="Moderate" cwe="CWE-404" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1473</cve>
          <cve public="20220621" href="https://access.redhat.com/security/cve/CVE-2022-2068" impact="Moderate" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2068</cve>
          <cve public="20220705" href="https://access.redhat.com/security/cve/CVE-2022-2097" impact="Moderate" cwe="CWE-325" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-2097</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224001" comment="openssl is earlier than 1:3.0.1-41.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224009" comment="openssl-devel is earlier than 1:3.0.1-41.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224010" comment="openssl-libs is earlier than 1:3.0.1-41.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224007" comment="openssl-perl is earlier than 1:3.0.1-41.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226313" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6313: pcs security update (Important)</title>
        <reference ref_id="RHSA-2022:6313" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6313"/>
        <reference ref_id="CVE-2022-2735" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2735"/>
        <reference ref_id="ALSA-2022:6313" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6313.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* pcs: obtaining an authentication token for hacluster user could lead to privilege escalation (CVE-2022-2735)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-01"/>
          <updated date="2022-09-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2116815" id="2116815"></bugzilla>
          <cve public="20220901" href="https://access.redhat.com/security/cve/CVE-2022-2735" impact="Important" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2735</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226313001" comment="pcs is earlier than 0:0.11.1-10.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226313003" comment="pcs-snmp is earlier than 0:0.11.1-10.el9_0.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226358" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6358: open-vm-tools security update (Important)</title>
        <reference ref_id="RHSA-2022:6358" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6358"/>
        <reference ref_id="CVE-2022-31676" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31676"/>
        <reference ref_id="ALSA-2022:6358" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6358.html"/>
        <description>The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.

Security Fix(es):

* open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-06"/>
          <updated date="2022-09-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2118714" id="2118714"></bugzilla>
          <cve public="20220823" href="https://access.redhat.com/security/cve/CVE-2022-31676" impact="Important" cwe="CWE-250" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-31676</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358001" comment="open-vm-tools is earlier than 0:11.3.5-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358002" comment="open-vm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358003" comment="open-vm-tools-desktop is earlier than 0:11.3.5-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358004" comment="open-vm-tools-desktop is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358009" comment="open-vm-tools-sdmp is earlier than 0:11.3.5-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358006" comment="open-vm-tools-sdmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358007" comment="open-vm-tools-test is earlier than 0:11.3.5-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358008" comment="open-vm-tools-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226521" version="640" class="patch">
      <metadata>
        <title>ALSA-2022:6521: .NET 6.0 security and bugfix update (Moderate)</title>
        <reference ref_id="RHSA-2022:6521" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6521"/>
        <reference ref_id="CVE-2022-38013" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38013"/>
        <reference ref_id="ALSA-2022:6521" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6521.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET 6.0 to SDK 6.0.109 and Runtime 6.0.9.

Security Fix(es):

* dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion. (CVE-2022-38013)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-14"/>
          <updated date="2022-09-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2125124" id="2125124"></bugzilla>
          <cve public="20220913" href="https://access.redhat.com/security/cve/CVE-2022-38013" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-38013</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521007" comment="dotnet-host is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521009" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521011" comment="dotnet-runtime-6.0 is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521013" comment="dotnet-sdk-6.0 is earlier than 0:6.0.109-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521015" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.109-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521017" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.9-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521019" comment="dotnet-templates-6.0 is earlier than 0:6.0.109-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226521021" comment="netstandard-targeting-pack-2.1 is earlier than 0:6.0.109-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226580" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6580: booth security update (Moderate)</title>
        <reference ref_id="RHSA-2022:6580" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6580"/>
        <reference ref_id="CVE-2022-2553" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2553"/>
        <reference ref_id="ALSA-2022:6580" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6580.html"/>
        <description>The Booth cluster ticket manager is a component to bridge high availability clusters spanning multiple sites, in particular, to provide decision inputs to local Pacemaker cluster resource managers. It operates as a distributed consensus-based service, presumably on a separate physical network. Tickets facilitated by a Booth formation are the units of authorization that can be bound to certain resources. This will ensure that the resources are run at only one (granted) site at a time.

Security Fix(es):

* booth: authfile directive in booth config file is completely ignored. (CVE-2022-2553)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2109251" id="2109251"></bugzilla>
          <cve public="20220701" href="https://access.redhat.com/security/cve/CVE-2022-2553" impact="Moderate" cwe="CWE-287" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-2553</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580001" comment="booth is earlier than 0:1.0-251.3.bfb2f92.git.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580002" comment="booth is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580005" comment="booth-core is earlier than 0:1.0-251.3.bfb2f92.git.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580006" comment="booth-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580003" comment="booth-arbitrator is earlier than 0:1.0-251.3.bfb2f92.git.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580004" comment="booth-arbitrator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580007" comment="booth-site is earlier than 0:1.0-251.3.bfb2f92.git.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580008" comment="booth-site is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580009" comment="booth-test is earlier than 0:1.0-251.3.bfb2f92.git.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580010" comment="booth-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226582" version="638" class="patch">
      <metadata>
        <title>ALSA-2022:6582: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2022:6582" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6582"/>
        <reference ref_id="CVE-2022-2078" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2078"/>
        <reference ref_id="CVE-2022-34918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34918"/>
        <reference ref_id="ALSA-2022:6582" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6582.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)
* kernel: vulnerability of buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the latest AlmaLinux-9.0.z3 Batch (BZ#2119577)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2096178" id="2096178"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2104423" id="2104423"></bugzilla>
          <cve public="20220531" href="https://access.redhat.com/security/cve/CVE-2022-2078" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2078</cve>
          <cve public="20220702" href="https://access.redhat.com/security/cve/CVE-2022-34918" impact="Important" cwe="CWE-1025" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-34918</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582024" comment="kernel-rt is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582025" comment="kernel-rt-core is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582026" comment="kernel-rt-debug is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582032" comment="kernel-rt-devel is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582033" comment="kernel-rt-kvm is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582034" comment="kernel-rt-modules is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226582035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-70.26.1.rt21.98.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226585" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6585: ruby security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:6585" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6585"/>
        <reference ref_id="CVE-2022-28738" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28738"/>
        <reference ref_id="CVE-2022-28739" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28739"/>
        <reference ref_id="ALSA-2022:6585" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6585.html"/>
        <description>Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109428)

Security Fix(es):

* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2075685" id="2075685"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2075687" id="2075687"></bugzilla>
          <cve public="20220414" href="https://access.redhat.com/security/cve/CVE-2022-28738" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2022-28738</cve>
          <cve public="20220414" href="https://access.redhat.com/security/cve/CVE-2022-28739" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-28739</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585001" comment="ruby is earlier than 0:3.0.4-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838044" comment="ruby is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585005" comment="ruby-devel is earlier than 0:3.0.4-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838045" comment="ruby-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585009" comment="ruby-libs is earlier than 0:3.0.4-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838046" comment="ruby-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585011" comment="rubygem-bigdecimal is earlier than 0:3.0.0-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838047" comment="rubygem-bigdecimal is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585015" comment="rubygem-io-console is earlier than 0:0.5.7-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838048" comment="rubygem-io-console is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585019" comment="rubygem-json is earlier than 0:2.5.1-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838049" comment="rubygem-json is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585025" comment="rubygem-psych is earlier than 0:3.3.2-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838050" comment="rubygem-psych is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585003" comment="ruby-default-gems is earlier than 0:3.0.4-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838051" comment="ruby-default-gems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585007" comment="ruby-doc is earlier than 0:3.0.4-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838052" comment="ruby-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585013" comment="rubygem-bundler is earlier than 0:2.2.33-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838053" comment="rubygem-bundler is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585017" comment="rubygem-irb is earlier than 0:1.3.5-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838054" comment="rubygem-irb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585021" comment="rubygem-minitest is earlier than 0:5.14.2-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838055" comment="rubygem-minitest is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585023" comment="rubygem-power_assert is earlier than 0:1.2.0-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838056" comment="rubygem-power_assert is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585027" comment="rubygem-rake is earlier than 0:13.0.3-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838057" comment="rubygem-rake is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585029" comment="rubygem-rbs is earlier than 0:1.4.0-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838058" comment="rubygem-rbs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585031" comment="rubygem-rdoc is earlier than 0:6.3.3-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838059" comment="rubygem-rdoc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585033" comment="rubygem-rexml is earlier than 0:3.2.5-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838060" comment="rubygem-rexml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585035" comment="rubygem-rss is earlier than 0:0.2.9-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838061" comment="rubygem-rss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585037" comment="rubygem-test-unit is earlier than 0:3.3.7-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838062" comment="rubygem-test-unit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585039" comment="rubygem-typeprof is earlier than 0:0.15.2-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838063" comment="rubygem-typeprof is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585041" comment="rubygems is earlier than 0:3.2.33-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838064" comment="rubygems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226585043" comment="rubygems-devel is earlier than 0:3.2.33-160.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838065" comment="rubygems-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226590" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:6590: mysql security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:6590" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6590"/>
        <reference ref_id="CVE-2022-21412" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21412"/>
        <reference ref_id="CVE-2022-21413" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21413"/>
        <reference ref_id="CVE-2022-21414" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21414"/>
        <reference ref_id="CVE-2022-21415" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21415"/>
        <reference ref_id="CVE-2022-21417" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21417"/>
        <reference ref_id="CVE-2022-21418" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21418"/>
        <reference ref_id="CVE-2022-21423" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21423"/>
        <reference ref_id="CVE-2022-21425" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21425"/>
        <reference ref_id="CVE-2022-21427" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21427"/>
        <reference ref_id="CVE-2022-21435" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21435"/>
        <reference ref_id="CVE-2022-21436" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21436"/>
        <reference ref_id="CVE-2022-21437" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21437"/>
        <reference ref_id="CVE-2022-21438" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21438"/>
        <reference ref_id="CVE-2022-21440" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21440"/>
        <reference ref_id="CVE-2022-21444" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21444"/>
        <reference ref_id="CVE-2022-21451" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21451"/>
        <reference ref_id="CVE-2022-21452" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21452"/>
        <reference ref_id="CVE-2022-21454" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21454"/>
        <reference ref_id="CVE-2022-21455" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21455"/>
        <reference ref_id="CVE-2022-21457" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21457"/>
        <reference ref_id="CVE-2022-21459" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21459"/>
        <reference ref_id="CVE-2022-21460" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21460"/>
        <reference ref_id="CVE-2022-21462" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21462"/>
        <reference ref_id="CVE-2022-21478" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21478"/>
        <reference ref_id="CVE-2022-21479" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21479"/>
        <reference ref_id="CVE-2022-21509" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21509"/>
        <reference ref_id="CVE-2022-21515" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21515"/>
        <reference ref_id="CVE-2022-21517" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21517"/>
        <reference ref_id="CVE-2022-21522" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21522"/>
        <reference ref_id="CVE-2022-21525" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21525"/>
        <reference ref_id="CVE-2022-21526" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21526"/>
        <reference ref_id="CVE-2022-21527" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21527"/>
        <reference ref_id="CVE-2022-21528" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21528"/>
        <reference ref_id="CVE-2022-21529" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21529"/>
        <reference ref_id="CVE-2022-21530" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21530"/>
        <reference ref_id="CVE-2022-21531" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21531"/>
        <reference ref_id="CVE-2022-21534" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21534"/>
        <reference ref_id="CVE-2022-21537" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21537"/>
        <reference ref_id="CVE-2022-21538" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21538"/>
        <reference ref_id="CVE-2022-21539" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21539"/>
        <reference ref_id="CVE-2022-21547" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21547"/>
        <reference ref_id="CVE-2022-21553" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21553"/>
        <reference ref_id="CVE-2022-21556" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21556"/>
        <reference ref_id="CVE-2022-21569" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21569"/>
        <reference ref_id="ALSA-2022:6590" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6590.html"/>
        <description>MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)

Security Fix(es):

* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)
* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)
* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)
* mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)
* mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)
* mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)
* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Default logrotate set to wrong log file (BZ#2122592)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2082636" id="2082636"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082637" id="2082637"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082638" id="2082638"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082639" id="2082639"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082640" id="2082640"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082641" id="2082641"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082642" id="2082642"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082643" id="2082643"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082644" id="2082644"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082645" id="2082645"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082646" id="2082646"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082647" id="2082647"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082648" id="2082648"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082649" id="2082649"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082650" id="2082650"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082651" id="2082651"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082652" id="2082652"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082653" id="2082653"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082654" id="2082654"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082655" id="2082655"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082656" id="2082656"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082657" id="2082657"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082658" id="2082658"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082659" id="2082659"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115282" id="2115282"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115283" id="2115283"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115284" id="2115284"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115285" id="2115285"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115286" id="2115286"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115287" id="2115287"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115288" id="2115288"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115289" id="2115289"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115290" id="2115290"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115291" id="2115291"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115292" id="2115292"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115293" id="2115293"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115294" id="2115294"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115295" id="2115295"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115296" id="2115296"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115297" id="2115297"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115298" id="2115298"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115299" id="2115299"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115300" id="2115300"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115301" id="2115301"></bugzilla>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21412" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21412</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21413" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21413</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21414" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21414</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21415" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21415</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21417" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21417</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21418" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21418</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21423" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21423</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21425" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21425</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21427" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21427</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21435" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21435</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21436" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21436</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21437" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21437</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21438" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21438</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21440" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21440</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21444" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21444</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21451" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21451</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21452" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21452</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21454" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21454</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21455" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N">CVE-2022-21455</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21457" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-21457</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21459" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21459</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21460" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2022-21460</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21462" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21462</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21478" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21478</cve>
          <cve public="20220419" href="https://access.redhat.com/security/cve/CVE-2022-21479" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H">CVE-2022-21479</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21509" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21509</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21515" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21515</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21517" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21517</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21522" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21522</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21525" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21525</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21526" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21526</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21527" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21527</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21528" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2022-21528</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21529" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21529</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21530" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21530</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21531" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21531</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21534" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21534</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21537" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21537</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21538" impact="Low" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21538</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21539" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L">CVE-2022-21539</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21547" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21547</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21553" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21553</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21556" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H">CVE-2022-21556</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21569" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21569</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590001" comment="mysql is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590002" comment="mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590003" comment="mysql-common is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590004" comment="mysql-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590005" comment="mysql-devel is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590006" comment="mysql-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590007" comment="mysql-errmsg is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590008" comment="mysql-errmsg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590009" comment="mysql-libs is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590010" comment="mysql-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590011" comment="mysql-server is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590012" comment="mysql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590013" comment="mysql-test is earlier than 0:8.0.30-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590014" comment="mysql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226595" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:6595: nodejs and nodejs-nodemon security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:6595" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6595"/>
        <reference ref_id="CVE-2020-28469" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-28469"/>
        <reference ref_id="CVE-2020-7788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-7788"/>
        <reference ref_id="CVE-2021-33502" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-33502"/>
        <reference ref_id="CVE-2021-3807" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3807"/>
        <reference ref_id="CVE-2022-29244" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29244"/>
        <reference ref_id="CVE-2022-32212" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32212"/>
        <reference ref_id="CVE-2022-32213" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32213"/>
        <reference ref_id="CVE-2022-32214" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32214"/>
        <reference ref_id="CVE-2022-32215" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32215"/>
        <reference ref_id="CVE-2022-33987" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-33987"/>
        <reference ref_id="ALSA-2022:6595" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6595.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (16.16.0), nodejs-nodemon (2.0.19). (BZ#2124230, BZ#2124233)

Security Fix(es):

* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace (CVE-2022-29244)
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* nodejs:16/nodejs: Rebase to the latest Nodejs 16 release [almalinux-9] (BZ#2121019)
* nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2124299)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1907444" id="1907444"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1945459" id="1945459"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1964461" id="1964461"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2007557" id="2007557"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2098556" id="2098556"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2102001" id="2102001"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2105422" id="2105422"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2105426" id="2105426"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2105428" id="2105428"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2105430" id="2105430"></bugzilla>
          <cve public="20210112" href="https://access.redhat.com/security/cve/CVE-2020-28469" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2020-28469</cve>
          <cve public="20201208" href="https://access.redhat.com/security/cve/CVE-2020-7788" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2020-7788</cve>
          <cve public="20210521" href="https://access.redhat.com/security/cve/CVE-2021-33502" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-33502</cve>
          <cve public="20210917" href="https://access.redhat.com/security/cve/CVE-2021-3807" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-3807</cve>
          <cve public="20220613" href="https://access.redhat.com/security/cve/CVE-2022-29244" impact="Moderate" cwe="CWE-212" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-29244</cve>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2022-32212" impact="Moderate" cwe="CWE-703" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-32212</cve>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2022-32213" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-32213</cve>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2022-32214" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-32214</cve>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2022-32215" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-32215</cve>
          <cve public="20220618" href="https://access.redhat.com/security/cve/CVE-2022-33987" impact="Moderate" cwe="CWE-601" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-33987</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595001" comment="nodejs is earlier than 1:16.16.0-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595005" comment="nodejs-full-i18n is earlier than 1:16.16.0-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595013" comment="nodejs-libs is earlier than 1:16.16.0-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595009" comment="npm is earlier than 1:8.11.0-1.16.16.0.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595003" comment="nodejs-docs is earlier than 1:16.16.0-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595011" comment="nodejs-nodemon is earlier than 0:2.0.19-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595012" comment="nodejs-nodemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226602" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:6602: gnupg2 security update (Moderate)</title>
        <reference ref_id="RHSA-2022:6602" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6602"/>
        <reference ref_id="CVE-2022-34903" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34903"/>
        <reference ref_id="ALSA-2022:6602" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6602.html"/>
        <description>The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.

Security Fix(es):

* gpg: Signature spoofing via status line injection (CVE-2022-34903)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2102868" id="2102868"></bugzilla>
          <cve public="20220630" href="https://access.redhat.com/security/cve/CVE-2022-34903" impact="Moderate" cwe="CWE-347" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-34903</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226602001" comment="gnupg2 is earlier than 0:2.3.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226602002" comment="gnupg2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226602003" comment="gnupg2-smime is earlier than 0:2.3.3-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226602004" comment="gnupg2-smime is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226610" version="641" class="patch">
      <metadata>
        <title>ALSA-2022:6610: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2022:6610" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6610"/>
        <reference ref_id="CVE-2022-2078" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2078"/>
        <reference ref_id="CVE-2022-34918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34918"/>
        <reference ref_id="ALSA-2022:6610" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6610.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)
* kernel: vulnerability of buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* RDMA/mlx5: Fix number of allocated XLT entries (BZ#2092270)
* mlx5, Setup hanged when run test-route-nexthop-object.sh (BZ#2092535)
* many call traces from unchecked MSR access error: WRMSR to 0x199 in amazon i4.32xlarge instance (BZ#2099417)
* X86/platform/UV: Kernel Support Fixes for UV5 platform (BZ#2107732)
* block layer: fixes for md sync slow and softlockup at blk_mq_sched_dispatch_requests [9.0.0.z] (BZ#2111395)
* Fixes for NVMe/TCP dereferences an invalid, non-canonical pointer, kernel panic (BZ#2117755)
* Adding missing nvme fix to AlmaLinux-9.1 (BZ#2117756)
* nvme/tcp mistakenly uses blk_mq_tag_to_rq(nvme_tcp_tagset(queue) (BZ#2118698)
* Important ice bug fixes (BZ#2119290)
* Power 9/ppc64le Incorrect Socket(s) &amp; "Core(s) per socket" reported by lscpu command. (BZ#2121719)

Enhancement(s):

* lscpu does not show all of the support AMX flags (amx_int8, amx_bf16)  (BZ#2108203)
* ice: Driver Update (BZ#2108204)
* iavf: Driver Update (BZ#2119477)
* i40e: Driver Update (BZ#2119479)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2096178" id="2096178"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2104423" id="2104423"></bugzilla>
          <cve public="20220531" href="https://access.redhat.com/security/cve/CVE-2022-2078" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2078</cve>
          <cve public="20220702" href="https://access.redhat.com/security/cve/CVE-2022-34918" impact="Important" cwe="CWE-1025" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-34918</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610001" comment="bpftool is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610003" comment="kernel is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610007" comment="kernel-core is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610009" comment="kernel-cross-headers is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610011" comment="kernel-debug is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610013" comment="kernel-debug-core is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610015" comment="kernel-debug-devel is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610019" comment="kernel-debug-modules is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610023" comment="kernel-devel is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610025" comment="kernel-devel-matched is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610029" comment="kernel-modules is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610031" comment="kernel-modules-extra is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610033" comment="kernel-tools is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610054" comment="kernel-tools-libs is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610055" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610056" comment="kernel-zfcpdump is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610057" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610058" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610059" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610060" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610061" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610051" comment="perf is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610053" comment="python3-perf is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226610027" comment="kernel-doc is earlier than 0:5.14.0-70.26.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226634" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:6634: webkit2gtk3 security update (Moderate)</title>
        <reference ref_id="RHSA-2022:6634" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6634"/>
        <reference ref_id="CVE-2022-32893" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32893"/>
        <reference ref_id="ALSA-2022:6634" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6634.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).

Security Fix(es):

* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-09-20"/>
          <updated date="2022-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2121645" id="2121645"></bugzilla>
          <cve public="20220825" href="https://access.redhat.com/security/cve/CVE-2022-32893" impact="Moderate" cwe="CWE-20-&gt;CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-32893</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634001" comment="webkit2gtk3 is earlier than 0:2.36.7-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634003" comment="webkit2gtk3-devel is earlier than 0:2.36.7-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634005" comment="webkit2gtk3-jsc is earlier than 0:2.36.7-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.36.7-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226763" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6763: bind security update (Important)</title>
        <reference ref_id="RHSA-2022:6763" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6763"/>
        <reference ref_id="CVE-2022-3080" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3080"/>
        <reference ref_id="CVE-2022-38177" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38177"/>
        <reference ref_id="CVE-2022-38178" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38178"/>
        <reference ref_id="ALSA-2022:6763" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6763.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-03"/>
          <updated date="2022-10-03"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2128600" id="2128600"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2128601" id="2128601"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2128602" id="2128602"></bugzilla>
          <cve public="20220921" href="https://access.redhat.com/security/cve/CVE-2022-3080" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3080</cve>
          <cve public="20220921" href="https://access.redhat.com/security/cve/CVE-2022-38177" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-38177</cve>
          <cve public="20220921" href="https://access.redhat.com/security/cve/CVE-2022-38178" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-38178</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763001" comment="bind is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763003" comment="bind-chroot is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763019" comment="bind-devel is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763009" comment="bind-dnssec-utils is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763020" comment="bind-libs is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763015" comment="bind-utils is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763007" comment="bind-dnssec-doc is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763013" comment="bind-license is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763017" comment="python3-bind is earlier than 32:9.16.23-1.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226838" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6838: expat security update (Important)</title>
        <reference ref_id="RHSA-2022:6838" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6838"/>
        <reference ref_id="CVE-2022-40674" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-40674"/>
        <reference ref_id="ALSA-2022:6838" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6838.html"/>
        <description>Expat is a C library for parsing XML documents.

Security Fix(es):

* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-06"/>
          <updated date="2022-10-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2130769" id="2130769"></bugzilla>
          <cve public="20220914" href="https://access.redhat.com/security/cve/CVE-2022-40674" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-40674</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226838001" comment="expat is earlier than 0:2.2.10-12.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244002" comment="expat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226838003" comment="expat-devel is earlier than 0:2.2.10-12.el9_0.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244004" comment="expat-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226854" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:6854: gnutls and nettle security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:6854" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6854"/>
        <reference ref_id="CVE-2022-2509" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2509"/>
        <reference ref_id="ALSA-2022:6854" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6854.html"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

The following packages have been upgraded to a later upstream version: gnutls (3.7.6), nettle (3.8).

Security Fix(es):

* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [IBM 9.1] [P10] POWER10 performance enhancements for cryptography: nettle - incremental work (BZ#2102589)
* Allow enabling KTLS in AlmaLinux 9.1 (BZ#2108532)
* DES-CBC bag is decryptable under FIPS (BZ#2115314)
* allow signature verification using RSA keys &lt;2k in FIPS mode (BZ#2119770)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-11"/>
          <updated date="2022-10-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2108977" id="2108977"></bugzilla>
          <cve public="20220729" href="https://access.redhat.com/security/cve/CVE-2022-2509" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2509</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854001" comment="gnutls is earlier than 0:3.7.6-12.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854002" comment="gnutls is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854003" comment="gnutls-c++ is earlier than 0:3.7.6-12.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854004" comment="gnutls-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854005" comment="gnutls-dane is earlier than 0:3.7.6-12.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854006" comment="gnutls-dane is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854007" comment="gnutls-devel is earlier than 0:3.7.6-12.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854008" comment="gnutls-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854011" comment="gnutls-utils is earlier than 0:3.7.6-12.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854010" comment="gnutls-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226913" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:6913: .NET 6.0 security and bugfix update (Moderate)</title>
        <reference ref_id="RHSA-2022:6913" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6913"/>
        <reference ref_id="CVE-2022-41032" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41032"/>
        <reference ref_id="ALSA-2022:6913" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6913.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK  6.0.110 and .NET Runtime 6.0.10.

Security Fix(es):

* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-12"/>
          <updated date="2022-10-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2132614" id="2132614"></bugzilla>
          <cve public="20221011" href="https://access.redhat.com/security/cve/CVE-2022-41032" impact="Moderate" cwe="CWE-524" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-41032</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913007" comment="dotnet-host is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913009" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913011" comment="dotnet-runtime-6.0 is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913013" comment="dotnet-sdk-6.0 is earlier than 0:6.0.110-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913015" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.110-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913017" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.10-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913019" comment="dotnet-templates-6.0 is earlier than 0:6.0.110-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226913021" comment="netstandard-targeting-pack-2.1 is earlier than 0:6.0.110-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226963" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:6963: nodejs security update (Important)</title>
        <reference ref_id="RHSA-2022:6963" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6963"/>
        <reference ref_id="CVE-2022-35255" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-35255"/>
        <reference ref_id="CVE-2022-35256" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-35256"/>
        <reference ref_id="ALSA-2022:6963" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6963.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (16.17.1).

Security Fix(es):

* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-18"/>
          <updated date="2022-10-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2130517" id="2130517"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130518" id="2130518"></bugzilla>
          <cve public="20220923" href="https://access.redhat.com/security/cve/CVE-2022-35255" impact="Important" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-35255</cve>
          <cve public="20220923" href="https://access.redhat.com/security/cve/CVE-2022-35256" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-35256</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226963001" comment="nodejs is earlier than 1:16.17.1-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226963005" comment="nodejs-full-i18n is earlier than 1:16.17.1-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226963010" comment="nodejs-libs is earlier than 1:16.17.1-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226963009" comment="npm is earlier than 1:8.15.0-1.16.17.1.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226963003" comment="nodejs-docs is earlier than 1:16.17.1-1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20226999" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:6999: java-17-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:6999" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:6999"/>
        <reference ref_id="CVE-2022-21618" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21618"/>
        <reference ref_id="CVE-2022-21619" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21619"/>
        <reference ref_id="CVE-2022-21624" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21624"/>
        <reference ref_id="CVE-2022-21626" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21626"/>
        <reference ref_id="CVE-2022-21628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21628"/>
        <reference ref_id="CVE-2022-39399" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39399"/>
        <reference ref_id="ALSA-2022:6999" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-6999.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [almalinux-9] (BZ#2132934)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-20"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133745" id="2133745"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133753" id="2133753"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133765" id="2133765"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133769" id="2133769"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133776" id="2133776"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133817" id="2133817"></bugzilla>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21618" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21618</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21619" impact="Low" cwe="CWE-192" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21619</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21624" impact="Low" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21624</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21626" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21626</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21628" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21628</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39399" impact="Low" cwe="CWE-290" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-39399</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999001" comment="java-17-openjdk is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999003" comment="java-17-openjdk-demo is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999009" comment="java-17-openjdk-devel is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999017" comment="java-17-openjdk-headless is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999027" comment="java-17-openjdk-jmods is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999035" comment="java-17-openjdk-src is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226999045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.5.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227007" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:7007: java-1.8.0-openjdk security update (Moderate)</title>
        <reference ref_id="RHSA-2022:7007" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7007"/>
        <reference ref_id="CVE-2022-21619" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21619"/>
        <reference ref_id="CVE-2022-21624" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21624"/>
        <reference ref_id="CVE-2022-21626" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21626"/>
        <reference ref_id="CVE-2022-21628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21628"/>
        <reference ref_id="ALSA-2022:7007" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7007.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-20"/>
          <updated date="2022-10-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133745" id="2133745"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133753" id="2133753"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133765" id="2133765"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133769" id="2133769"></bugzilla>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21619" impact="Low" cwe="CWE-192" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21619</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21624" impact="Low" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21624</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21626" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21626</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21628" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21628</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227007025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.352.b08-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227013" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:7013: java-11-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:7013" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7013"/>
        <reference ref_id="CVE-2022-21618" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21618"/>
        <reference ref_id="CVE-2022-21619" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21619"/>
        <reference ref_id="CVE-2022-21624" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21624"/>
        <reference ref_id="CVE-2022-21626" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21626"/>
        <reference ref_id="CVE-2022-21628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21628"/>
        <reference ref_id="CVE-2022-39399" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39399"/>
        <reference ref_id="ALSA-2022:7013" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7013.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [almalinux-9] (BZ#2131865)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-20"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133745" id="2133745"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133753" id="2133753"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133765" id="2133765"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133769" id="2133769"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133776" id="2133776"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133817" id="2133817"></bugzilla>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21618" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21618</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21619" impact="Low" cwe="CWE-192" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21619</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21624" impact="Low" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-21624</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21626" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21626</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21628" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-21628</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39399" impact="Low" cwe="CWE-290" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-39399</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013001" comment="java-11-openjdk is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013003" comment="java-11-openjdk-demo is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013009" comment="java-11-openjdk-devel is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013017" comment="java-11-openjdk-headless is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013027" comment="java-11-openjdk-jmods is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013035" comment="java-11-openjdk-src is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227013045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.17.0.8-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227178" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7178: thunderbird security update (Important)</title>
        <reference ref_id="RHSA-2022:7178" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7178"/>
        <reference ref_id="CVE-2022-39236" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39236"/>
        <reference ref_id="CVE-2022-39249" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39249"/>
        <reference ref_id="CVE-2022-39250" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39250"/>
        <reference ref_id="CVE-2022-39251" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39251"/>
        <reference ref_id="CVE-2022-42927" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42927"/>
        <reference ref_id="CVE-2022-42928" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42928"/>
        <reference ref_id="CVE-2022-42929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42929"/>
        <reference ref_id="CVE-2022-42932" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42932"/>
        <reference ref_id="ALSA-2022:7178" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7178.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 102.4.0.

Security Fix(es):

* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251)
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927)
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236)
* Mozilla: Denial of Service via window.print (CVE-2022-42929)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-25"/>
          <updated date="2022-10-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2135391" id="2135391"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2135393" id="2135393"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2135395" id="2135395"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2135396" id="2135396"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2136156" id="2136156"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2136157" id="2136157"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2136158" id="2136158"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2136159" id="2136159"></bugzilla>
          <cve public="20220928" href="https://access.redhat.com/security/cve/CVE-2022-39236" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2022-39236</cve>
          <cve public="20220928" href="https://access.redhat.com/security/cve/CVE-2022-39249" impact="Important" cwe="(CWE-287|CWE-322)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-39249</cve>
          <cve public="20220928" href="https://access.redhat.com/security/cve/CVE-2022-39250" impact="Important" cwe="(CWE-287|CWE-322)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-39250</cve>
          <cve public="20220928" href="https://access.redhat.com/security/cve/CVE-2022-39251" impact="Important" cwe="(CWE-287|CWE-322)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-39251</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-42927" impact="Important" cwe="CWE-829" cvss3="CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42927</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-42928" impact="Important" cwe="CWE-120" cvss3="CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42928</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-42929" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2022-42929</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-42932" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2022-42932</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20227178002" comment="thunderbird is earlier than 0:102.4.0-1.el9_0.alma.plus.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227185" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:7185: device-mapper-multipath security update (Important)</title>
        <reference ref_id="RHSA-2022:7185" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7185"/>
        <reference ref_id="CVE-2022-41974" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41974"/>
        <reference ref_id="ALSA-2022:7185" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7185.html"/>
        <description>The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.

Security Fix(es):

* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-10-25"/>
          <updated date="2022-10-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133988" id="2133988"></bugzilla>
          <cve public="20221024" href="https://access.redhat.com/security/cve/CVE-2022-41974" impact="Important" cwe="CWE-285" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-41974</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185001" comment="device-mapper-multipath is earlier than 0:0.8.7-7.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185002" comment="device-mapper-multipath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185009" comment="device-mapper-multipath-devel is earlier than 0:0.8.7-7.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185004" comment="device-mapper-multipath-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185010" comment="device-mapper-multipath-libs is earlier than 0:0.8.7-7.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185006" comment="device-mapper-multipath-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185007" comment="kpartx is earlier than 0:0.8.7-7.el9_0.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185008" comment="kpartx is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227288" version="643" class="patch">
      <metadata>
        <title>ALSA-2022:7288: openssl security update (Important)</title>
        <reference ref_id="RHSA-2022:7288" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7288"/>
        <reference ref_id="CVE-2022-3602" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3602"/>
        <reference ref_id="CVE-2022-3786" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3786"/>
        <reference ref_id="ALSA-2022:7288" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7288.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library.

Security Fix(es):

* OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)
* OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-01"/>
          <updated date="2022-11-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2137723" id="2137723"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2139104" id="2139104"></bugzilla>
          <cve public="20221101" href="https://access.redhat.com/security/cve/CVE-2022-3602" impact="Important" cwe="CWE-119-&gt;CWE-121" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-3602</cve>
          <cve public="20221101" href="https://access.redhat.com/security/cve/CVE-2022-3786" impact="Important" cwe="CWE-119-&gt;CWE-121-&gt;CWE-193" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3786</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227288001" comment="openssl is earlier than 1:3.0.1-43.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227288008" comment="openssl-devel is earlier than 1:3.0.1-43.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227288009" comment="openssl-libs is earlier than 1:3.0.1-43.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227288007" comment="openssl-perl is earlier than 1:3.0.1-43.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227314" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7314: zlib security update (Moderate)</title>
        <reference ref_id="RHSA-2022:7314" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7314"/>
        <reference ref_id="CVE-2022-37434" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-37434"/>
        <reference ref_id="ALSA-2022:7314" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7314.html"/>
        <description>The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.

Security Fix(es):

* zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-02"/>
          <updated date="2022-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2116639" id="2116639"></bugzilla>
          <cve public="20220805" href="https://access.redhat.com/security/cve/CVE-2022-37434" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2022-37434</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227314001" comment="zlib is earlier than 0:1.2.11-32.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224584002" comment="zlib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227314003" comment="zlib-devel is earlier than 0:1.2.11-32.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224584004" comment="zlib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227314005" comment="zlib-static is earlier than 0:1.2.11-32.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224584006" comment="zlib-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227318" version="641" class="patch">
      <metadata>
        <title>ALSA-2022:7318: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2022:7318" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7318"/>
        <reference ref_id="CVE-2022-2585" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2585"/>
        <reference ref_id="CVE-2022-30594" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30594"/>
        <reference ref_id="ALSA-2022:7318" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7318.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653)
* execve exit tracepoint not called (BZ#2106661)
* Matrox black screen on VGA output on some systems. (BZ#2112017)
* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129)
* watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857)
* Update cifs to 5.16 (BZ#2127858)
* Bad page state in process qemu-kvm  pfn:68a74600 (BZ#2127859)
* vfio zero page mappings fail after 2M instances (BZ#2128791)
* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970)

Enhancement(s):

* Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129453)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-02"/>
          <updated date="2022-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2085300" id="2085300"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114874" id="2114874"></bugzilla>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-2585" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2585</cve>
          <cve public="20220512" href="https://access.redhat.com/security/cve/CVE-2022-30594" impact="Moderate" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30594</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318001" comment="bpftool is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318003" comment="kernel is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318007" comment="kernel-core is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318009" comment="kernel-cross-headers is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318011" comment="kernel-debug is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318013" comment="kernel-debug-core is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318015" comment="kernel-debug-devel is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318019" comment="kernel-debug-modules is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318023" comment="kernel-devel is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318025" comment="kernel-devel-matched is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318029" comment="kernel-headers is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318031" comment="kernel-modules is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318033" comment="kernel-modules-extra is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318035" comment="kernel-tools is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318056" comment="kernel-tools-libs is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318057" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318058" comment="kernel-zfcpdump is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318059" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318060" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318061" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318062" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318063" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318053" comment="perf is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318055" comment="python3-perf is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227318027" comment="kernel-doc is earlier than 0:5.14.0-70.30.1.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227319" version="638" class="patch">
      <metadata>
        <title>ALSA-2022:7319: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2022:7319" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7319"/>
        <reference ref_id="CVE-2022-2585" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2585"/>
        <reference ref_id="CVE-2022-30594" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30594"/>
        <reference ref_id="ALSA-2022:7319" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7319.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Update RT source tree to the latest AlmaLinux-9.0.z4 Batch (BZ#2123498)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-02"/>
          <updated date="2022-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2085300" id="2085300"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114874" id="2114874"></bugzilla>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-2585" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2585</cve>
          <cve public="20220512" href="https://access.redhat.com/security/cve/CVE-2022-30594" impact="Moderate" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30594</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319024" comment="kernel-rt is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319025" comment="kernel-rt-core is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319026" comment="kernel-rt-debug is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319032" comment="kernel-rt-devel is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319033" comment="kernel-rt-kvm is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319034" comment="kernel-rt-modules is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227319035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-70.30.1.rt21.102.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227323" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:7323: python3.9 security update (Moderate)</title>
        <reference ref_id="RHSA-2022:7323" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7323"/>
        <reference ref_id="CVE-2020-10735" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-10735"/>
        <reference ref_id="ALSA-2022:7323" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7323.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-02"/>
          <updated date="2022-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1834423" id="1834423"></bugzilla>
          <cve public="20220902" href="https://access.redhat.com/security/cve/CVE-2020-10735" impact="Moderate" cwe="CWE-704-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2020-10735</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323003" comment="python3 is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323005" comment="python3-debug is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323007" comment="python3-devel is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323009" comment="python3-idle is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323011" comment="python3-libs is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323013" comment="python3-test is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323015" comment="python3-tkinter is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227323001" comment="python-unversioned-command is earlier than 0:3.9.10-3.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227326" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:7326: pki-core security update (Important)</title>
        <reference ref_id="RHSA-2022:7326" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7326"/>
        <reference ref_id="CVE-2022-2414" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2414"/>
        <reference ref_id="ALSA-2022:7326" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7326.html"/>
        <description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System.

Security Fix(es):

* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-02"/>
          <updated date="2022-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2104676" id="2104676"></bugzilla>
          <cve public="20220610" href="https://access.redhat.com/security/cve/CVE-2022-2414" impact="Important" cwe="CWE-611" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-2414</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326013" comment="pki-symkey is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326014" comment="pki-symkey is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326015" comment="pki-tools is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326016" comment="pki-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326001" comment="pki-acme is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326002" comment="pki-acme is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326003" comment="pki-base is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326004" comment="pki-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326005" comment="pki-base-java is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326006" comment="pki-base-java is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326007" comment="pki-ca is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326008" comment="pki-ca is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326009" comment="pki-kra is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326010" comment="pki-kra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326011" comment="pki-server is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326012" comment="pki-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326017" comment="python3-pki is earlier than 0:11.0.6-2.el9_0"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227326018" comment="python3-pki is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227933" version="639" class="patch">
      <metadata>
        <title>ALSA-2022:7933: kernel-rt security and bug fix update (Moderate)</title>
        <reference ref_id="ALSA-2022:7933" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7933.html"/>
        <reference ref_id="RHSA-2022:7933" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7933"/>
        <reference ref_id="CVE-2020-36516" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-36516"/>
        <reference ref_id="CVE-2021-3640" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3640"/>
        <reference ref_id="CVE-2022-0168" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0168"/>
        <reference ref_id="CVE-2022-0617" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0617"/>
        <reference ref_id="CVE-2022-0854" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0854"/>
        <reference ref_id="CVE-2022-1016" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1016"/>
        <reference ref_id="CVE-2022-1048" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1048"/>
        <reference ref_id="CVE-2022-1184" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1184"/>
        <reference ref_id="CVE-2022-1280" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1280"/>
        <reference ref_id="CVE-2022-1353" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1353"/>
        <reference ref_id="CVE-2022-1679" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1679"/>
        <reference ref_id="CVE-2022-1852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1852"/>
        <reference ref_id="CVE-2022-1998" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1998"/>
        <reference ref_id="CVE-2022-20368" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-20368"/>
        <reference ref_id="CVE-2022-21123" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21123"/>
        <reference ref_id="CVE-2022-21125" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21125"/>
        <reference ref_id="CVE-2022-21166" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21166"/>
        <reference ref_id="CVE-2022-21499" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21499"/>
        <reference ref_id="CVE-2022-23816" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23816"/>
        <reference ref_id="CVE-2022-23825" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23825"/>
        <reference ref_id="CVE-2022-24448" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24448"/>
        <reference ref_id="CVE-2022-2586" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2586"/>
        <reference ref_id="CVE-2022-26373" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26373"/>
        <reference ref_id="CVE-2022-2639" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2639"/>
        <reference ref_id="CVE-2022-28390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28390"/>
        <reference ref_id="CVE-2022-28893" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28893"/>
        <reference ref_id="CVE-2022-29581" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29581"/>
        <reference ref_id="CVE-2022-29900" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29900"/>
        <reference ref_id="CVE-2022-29901" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29901"/>
        <reference ref_id="CVE-2022-36946" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36946"/>
        <reference ref_id="CVE-2022-39190" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39190"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280)
* kernel info leak issue in pfkey_register (CVE-2022-1353)
* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
* incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
* incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
* AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)
* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nf_tables disallow binding to already bound chain (CVE-2022-39190)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2084125" id="2084125"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2084183" id="2084183"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2084479" id="2084479"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2088021" id="2088021"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2089815" id="2089815"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090226" id="2090226"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090237" id="2090237"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090240" id="2090240"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090241" id="2090241"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2103148" id="2103148"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2103153" id="2103153"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114878" id="2114878"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115065" id="2115065"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115278" id="2115278"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123695" id="2123695"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2129152" id="2129152"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1980646" id="1980646"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2037386" id="2037386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2051444" id="2051444"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2052312" id="2052312"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2053632" id="2053632"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2058395" id="2058395"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2059928" id="2059928"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2066614" id="2066614"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2066706" id="2066706"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2066819" id="2066819"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2070205" id="2070205"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2071022" id="2071022"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073064" id="2073064"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074208" id="2074208"></bugzilla>
          <cve public="20220228" href="https://access.redhat.com/security/cve/CVE-2020-36516" impact="Moderate" cwe="CWE-290" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L">CVE-2020-36516</cve>
          <cve public="20210718" href="https://access.redhat.com/security/cve/CVE-2021-3640" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2021-3640</cve>
          <cve public="20220309" href="https://access.redhat.com/security/cve/CVE-2022-0168" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-0168</cve>
          <cve public="20220124" href="https://access.redhat.com/security/cve/CVE-2022-0617" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-0617</cve>
          <cve public="20220307" href="https://access.redhat.com/security/cve/CVE-2022-0854" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-0854</cve>
          <cve public="20220328" href="https://access.redhat.com/security/cve/CVE-2022-1016" impact="Moderate" cwe="CWE-824" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-1016</cve>
          <cve public="20220323" href="https://access.redhat.com/security/cve/CVE-2022-1048" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1048</cve>
          <cve public="20220418" href="https://access.redhat.com/security/cve/CVE-2022-1184" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1184</cve>
          <cve public="20220407" href="https://access.redhat.com/security/cve/CVE-2022-1280" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1280</cve>
          <cve public="20220321" href="https://access.redhat.com/security/cve/CVE-2022-1353" impact="Moderate" cwe="CWE-212" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H">CVE-2022-1353</cve>
          <cve public="20220207" href="https://access.redhat.com/security/cve/CVE-2022-1679" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1679</cve>
          <cve public="20220601" href="https://access.redhat.com/security/cve/CVE-2022-1852" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1852</cve>
          <cve public="20220127" href="https://access.redhat.com/security/cve/CVE-2022-1998" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1998</cve>
          <cve public="20220315" href="https://access.redhat.com/security/cve/CVE-2022-20368" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-20368</cve>
          <cve public="20220614" href="https://access.redhat.com/security/cve/CVE-2022-21123" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N">CVE-2022-21123</cve>
          <cve public="20220614" href="https://access.redhat.com/security/cve/CVE-2022-21125" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-21125</cve>
          <cve public="20220614" href="https://access.redhat.com/security/cve/CVE-2022-21166" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-21166</cve>
          <cve public="20220524" href="https://access.redhat.com/security/cve/CVE-2022-21499" impact="Moderate" cwe="(CWE-267|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-21499</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-23816" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-23816</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-23825" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-23825</cve>
          <cve public="20220204" href="https://access.redhat.com/security/cve/CVE-2022-24448" impact="Low" cwe="CWE-908" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2022-24448</cve>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-2586" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2586</cve>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-26373" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-26373</cve>
          <cve public="20220415" href="https://access.redhat.com/security/cve/CVE-2022-2639" impact="Moderate" cwe="CWE-192-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2639</cve>
          <cve public="20220404" href="https://access.redhat.com/security/cve/CVE-2022-28390" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-28390</cve>
          <cve public="20220411" href="https://access.redhat.com/security/cve/CVE-2022-28893" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-28893</cve>
          <cve public="20220415" href="https://access.redhat.com/security/cve/CVE-2022-29581" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-29581</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-29900" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-29900</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-29901" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-29901</cve>
          <cve public="20220726" href="https://access.redhat.com/security/cve/CVE-2022-36946" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-36946</cve>
          <cve public="20220821" href="https://access.redhat.com/security/cve/CVE-2022-39190" impact="Moderate" cwe="CWE-392" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39190</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933024" comment="kernel-rt is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933025" comment="kernel-rt-core is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933026" comment="kernel-rt-debug is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933032" comment="kernel-rt-devel is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933033" comment="kernel-rt-kvm is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933034" comment="kernel-rt-modules is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227933035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-162.6.1.rt21.168.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227935" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7935: pcs security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:7935" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7935"/>
        <reference ref_id="CVE-2022-1049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1049"/>
        <reference ref_id="ALSA-2022:7935" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7935.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* pcs: improper authentication via PAM (CVE-2022-1049)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2066629" id="2066629"></bugzilla>
          <cve public="20220317" href="https://access.redhat.com/security/cve/CVE-2022-1049" impact="Moderate" cwe="CWE-287" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L">CVE-2022-1049</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227935001" comment="pcs is earlier than 0:0.11.3-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227935003" comment="pcs-snmp is earlier than 0:0.11.3-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227954" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7954: podman security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:7954" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7954"/>
        <reference ref_id="CVE-2020-28851" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-28851"/>
        <reference ref_id="CVE-2020-28852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-28852"/>
        <reference ref_id="CVE-2021-20199" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-20199"/>
        <reference ref_id="CVE-2021-20291" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-20291"/>
        <reference ref_id="CVE-2021-33197" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-33197"/>
        <reference ref_id="CVE-2021-34558" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-34558"/>
        <reference ref_id="CVE-2021-4024" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-4024"/>
        <reference ref_id="CVE-2022-27191" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27191"/>
        <reference ref_id="ALSA-2022:7954" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7954.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* podman: podman machine spawns gvproxy with port bound to all IPs (CVE-2021-4024)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
* containers/storage: DoS via malicious image (CVE-2021-20291)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1913333" id="1913333"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1913338" id="1913338"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1919050" id="1919050"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1939485" id="1939485"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1983596" id="1983596"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1989570" id="1989570"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2026675" id="2026675"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064702" id="2064702"></bugzilla>
          <cve public="20210102" href="https://access.redhat.com/security/cve/CVE-2020-28851" impact="Moderate" cwe="CWE-129" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2020-28851</cve>
          <cve public="20210102" href="https://access.redhat.com/security/cve/CVE-2020-28852" impact="Moderate" cwe="CWE-129" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2020-28852</cve>
          <cve public="20210101" href="https://access.redhat.com/security/cve/CVE-2021-20199" impact="Moderate" cwe="CWE-346" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2021-20199</cve>
          <cve public="20210401" href="https://access.redhat.com/security/cve/CVE-2021-20291" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2021-20291</cve>
          <cve public="20210521" href="https://access.redhat.com/security/cve/CVE-2021-33197" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2021-33197</cve>
          <cve public="20210713" href="https://access.redhat.com/security/cve/CVE-2021-34558" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2021-34558</cve>
          <cve public="20211124" href="https://access.redhat.com/security/cve/CVE-2021-4024" impact="Moderate" cwe="(CWE-200|CWE-346)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L">CVE-2021-4024</cve>
          <cve public="20220315" href="https://access.redhat.com/security/cve/CVE-2022-27191" impact="Moderate" cwe="CWE-327" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27191</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954001" comment="podman is earlier than 2:4.2.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954005" comment="podman-gvproxy is earlier than 2:4.2.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954006" comment="podman-gvproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954007" comment="podman-plugins is earlier than 2:4.2.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954009" comment="podman-remote is earlier than 2:4.2.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954011" comment="podman-tests is earlier than 2:4.2.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954003" comment="podman-docker is earlier than 2:4.2.0-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227958" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7958: libguestfs security, bug fix, and enhancement update (Low)</title>
        <reference ref_id="RHSA-2022:7958" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7958"/>
        <reference ref_id="CVE-2022-2211" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2211"/>
        <reference ref_id="ALSA-2022:7958" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7958.html"/>
        <description>The libguestfs packages contain a library used for accessing and modifying virtual machine disk images.

Security Fix(es):

* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2100862" id="2100862"></bugzilla>
          <cve public="20220624" href="https://access.redhat.com/security/cve/CVE-2022-2211" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-2211</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958039" comment="libguestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958002" comment="libguestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958040" comment="libguestfs-appliance is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958004" comment="libguestfs-appliance is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958041" comment="libguestfs-devel is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958008" comment="libguestfs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958042" comment="libguestfs-gobject is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958010" comment="libguestfs-gobject is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958043" comment="libguestfs-gobject-devel is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958012" comment="libguestfs-gobject-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958044" comment="libguestfs-rescue is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958020" comment="libguestfs-rescue is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958045" comment="libguestfs-rsync is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958022" comment="libguestfs-rsync is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958046" comment="libguestfs-xfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958024" comment="libguestfs-xfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958047" comment="lua-guestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958026" comment="lua-guestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958048" comment="ocaml-libguestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958028" comment="ocaml-libguestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958049" comment="ocaml-libguestfs-devel is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958030" comment="ocaml-libguestfs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958050" comment="perl-Sys-Guestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958032" comment="perl-Sys-Guestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958051" comment="php-libguestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958034" comment="php-libguestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958052" comment="python3-libguestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958036" comment="python3-libguestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958053" comment="ruby-libguestfs is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958038" comment="ruby-libguestfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958054" comment="libguestfs-bash-completion is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958006" comment="libguestfs-bash-completion is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958055" comment="libguestfs-inspect-icons is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958014" comment="libguestfs-inspect-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958056" comment="libguestfs-man-pages-ja is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958016" comment="libguestfs-man-pages-ja is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958057" comment="libguestfs-man-pages-uk is earlier than 1:1.48.4-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227958018" comment="libguestfs-man-pages-uk is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227967" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7967: qemu-kvm security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:7967" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7967"/>
        <reference ref_id="CVE-2021-3507" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3507"/>
        <reference ref_id="CVE-2021-3611" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3611"/>
        <reference ref_id="CVE-2021-3750" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3750"/>
        <reference ref_id="CVE-2021-4158" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-4158"/>
        <reference ref_id="ALSA-2022:7967" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7967.html"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757)

Security Fix(es):

* QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750)
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1951118" id="1951118"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1973784" id="1973784"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1999073" id="1999073"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2035002" id="2035002"></bugzilla>
          <cve public="20210419" href="https://access.redhat.com/security/cve/CVE-2021-3507" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:L">CVE-2021-3507</cve>
          <cve public="20201209" href="https://access.redhat.com/security/cve/CVE-2021-3611" impact="Low" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L">CVE-2021-3611</cve>
          <cve public="20200826" href="https://access.redhat.com/security/cve/CVE-2021-3750" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2021-3750</cve>
          <cve public="20211212" href="https://access.redhat.com/security/cve/CVE-2021-4158" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2021-4158</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967001" comment="qemu-guest-agent is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967003" comment="qemu-img is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967044" comment="qemu-kvm is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967045" comment="qemu-kvm-audio-pa is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967046" comment="qemu-kvm-block-curl is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967047" comment="qemu-kvm-block-rbd is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967048" comment="qemu-kvm-common is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967049" comment="qemu-kvm-core is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967050" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967051" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967052" comment="qemu-kvm-device-display-virtio-gpu-gl is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263022" comment="qemu-kvm-device-display-virtio-gpu-gl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967053" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967054" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263026" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967055" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967056" comment="qemu-kvm-device-display-virtio-vga-gl is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263030" comment="qemu-kvm-device-display-virtio-vga-gl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967057" comment="qemu-kvm-device-usb-host is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967058" comment="qemu-kvm-device-usb-redirect is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967059" comment="qemu-kvm-docs is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967060" comment="qemu-kvm-tools is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967061" comment="qemu-kvm-ui-egl-headless is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967062" comment="qemu-kvm-ui-opengl is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227967063" comment="qemu-pr-helper is earlier than 17:7.0.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227968" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7968: virt-v2v security, bug fix, and enhancement update (Low)</title>
        <reference ref_id="RHSA-2022:7968" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7968"/>
        <reference ref_id="CVE-2022-2211" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2211"/>
        <reference ref_id="ALSA-2022:7968" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7968.html"/>
        <description>The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or AlmaLinux Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible.

Security Fix(es):

* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2100862" id="2100862"></bugzilla>
          <cve public="20220624" href="https://access.redhat.com/security/cve/CVE-2022-2211" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-2211</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968009" comment="virt-v2v is earlier than 1:2.0.7-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968002" comment="virt-v2v is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968003" comment="virt-v2v-bash-completion is earlier than 1:2.0.7-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968004" comment="virt-v2v-bash-completion is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968005" comment="virt-v2v-man-pages-ja is earlier than 1:2.0.7-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968006" comment="virt-v2v-man-pages-ja is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968007" comment="virt-v2v-man-pages-uk is earlier than 1:2.0.7-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227968008" comment="virt-v2v-man-pages-uk is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227970" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7970: protobuf security update (Moderate)</title>
        <reference ref_id="RHSA-2022:7970" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7970"/>
        <reference ref_id="CVE-2021-22570" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-22570"/>
        <reference ref_id="ALSA-2022:7970" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7970.html"/>
        <description>The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.

Security Fix(es):

* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2049429" id="2049429"></bugzilla>
          <cve public="20220126" href="https://access.redhat.com/security/cve/CVE-2021-22570" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-22570</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970001" comment="protobuf is earlier than 0:3.14.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970002" comment="protobuf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970003" comment="protobuf-compiler is earlier than 0:3.14.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970004" comment="protobuf-compiler is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970005" comment="protobuf-devel is earlier than 0:3.14.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970006" comment="protobuf-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970007" comment="protobuf-lite is earlier than 0:3.14.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970008" comment="protobuf-lite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970009" comment="protobuf-lite-devel is earlier than 0:3.14.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970010" comment="protobuf-lite-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970011" comment="python3-protobuf is earlier than 0:3.14.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227970012" comment="python3-protobuf is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227978" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7978: gimp security and enhancement update (Moderate)</title>
        <reference ref_id="ALSA-2022:7978" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7978.html"/>
        <reference ref_id="RHSA-2022:7978" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7978"/>
        <reference ref_id="CVE-2022-30067" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30067"/>
        <reference ref_id="CVE-2022-32990" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32990"/>
        <description>The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.

Security Fix(es):

* gimp: buffer overflow through a crafted XCF file (CVE-2022-30067)
* gimp: unhandled exception via a crafted XCF file may lead to DoS (CVE-2022-32990)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2103202" id="2103202"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2087591" id="2087591"></bugzilla>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-30067" impact="Moderate" cwe="CWE-252-&gt;CWE-770-&gt;CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30067</cve>
          <cve public="20220603" href="https://access.redhat.com/security/cve/CVE-2022-32990" impact="Moderate" cwe="(CWE-393|CWE-755)-&gt;CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-32990</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227978001" comment="gimp is earlier than 2:2.99.8-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227978002" comment="gimp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227978005" comment="gimp-libs is earlier than 2:2.99.8-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227978004" comment="gimp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20227979" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:7979: speex security update (Low)</title>
        <reference ref_id="RHSA-2022:7979" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:7979"/>
        <reference ref_id="CVE-2020-23903" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-23903"/>
        <reference ref_id="ALSA-2022:7979" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-7979.html"/>
        <description>Speex is a patent-free compression format designed especially for speech. It is specialized for voice communications at low bit-rates.

Security Fix(es):

* speex: divide by zero in read_samples() via crafted WAV file (CVE-2020-23903)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2024250" id="2024250"></bugzilla>
          <cve public="20200713" href="https://access.redhat.com/security/cve/CVE-2020-23903" impact="Low" cwe="CWE-369" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2020-23903</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227979001" comment="speex is earlier than 0:1.2.0-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227979002" comment="speex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227979003" comment="speex-devel is earlier than 0:1.2.0-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227979004" comment="speex-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228003" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8003: libvirt security, bug fix, and enhancement update (Low)</title>
        <reference ref_id="RHSA-2022:8003" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8003"/>
        <reference ref_id="CVE-2022-0897" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0897"/>
        <reference ref_id="ALSA-2022:8003" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8003.html"/>
        <description>The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313)

Security Fix(es):

* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2063883" id="2063883"></bugzilla>
          <cve public="20220317" href="https://access.redhat.com/security/cve/CVE-2022-0897" impact="Low" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2022-0897</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003001" comment="libvirt is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757063" comment="libvirt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003003" comment="libvirt-client is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757065" comment="libvirt-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003005" comment="libvirt-daemon is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757069" comment="libvirt-daemon is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003007" comment="libvirt-daemon-config-network is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757073" comment="libvirt-daemon-config-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003009" comment="libvirt-daemon-config-nwfilter is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757075" comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003011" comment="libvirt-daemon-driver-interface is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757077" comment="libvirt-daemon-driver-interface is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003013" comment="libvirt-daemon-driver-network is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757079" comment="libvirt-daemon-driver-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003015" comment="libvirt-daemon-driver-nodedev is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757081" comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003017" comment="libvirt-daemon-driver-nwfilter is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757083" comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003051" comment="libvirt-daemon-driver-qemu is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757085" comment="libvirt-daemon-driver-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003021" comment="libvirt-daemon-driver-secret is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757087" comment="libvirt-daemon-driver-secret is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003023" comment="libvirt-daemon-driver-storage is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757089" comment="libvirt-daemon-driver-storage is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003025" comment="libvirt-daemon-driver-storage-core is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757091" comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003027" comment="libvirt-daemon-driver-storage-disk is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757093" comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003029" comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757095" comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003031" comment="libvirt-daemon-driver-storage-logical is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757097" comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003033" comment="libvirt-daemon-driver-storage-mpath is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757099" comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003035" comment="libvirt-daemon-driver-storage-rbd is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757101" comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003037" comment="libvirt-daemon-driver-storage-scsi is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757103" comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003052" comment="libvirt-daemon-kvm is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757105" comment="libvirt-daemon-kvm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003041" comment="libvirt-devel is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757117" comment="libvirt-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003043" comment="libvirt-docs is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757119" comment="libvirt-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003045" comment="libvirt-libs is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757121" comment="libvirt-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003053" comment="libvirt-lock-sanlock is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003048" comment="libvirt-lock-sanlock is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003049" comment="libvirt-nss is earlier than 0:8.5.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757123" comment="libvirt-nss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228011" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8011: fribidi security update (Moderate)</title>
        <reference ref_id="RHSA-2022:8011" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8011"/>
        <reference ref_id="CVE-2022-25308" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25308"/>
        <reference ref_id="CVE-2022-25309" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25309"/>
        <reference ref_id="CVE-2022-25310" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25310"/>
        <reference ref_id="ALSA-2022:8011" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8011.html"/>
        <description>FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.

Security Fix(es):

* fribidi: Stack based buffer overflow (CVE-2022-25308)
* fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309)
* fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2047890" id="2047890"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2047896" id="2047896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2047923" id="2047923"></bugzilla>
          <cve public="20211222" href="https://access.redhat.com/security/cve/CVE-2022-25308" impact="Moderate" cwe="CWE-121" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-25308</cve>
          <cve public="20211222" href="https://access.redhat.com/security/cve/CVE-2022-25309" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H">CVE-2022-25309</cve>
          <cve public="20211222" href="https://access.redhat.com/security/cve/CVE-2022-25310" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-25310</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228011001" comment="fribidi is earlier than 0:1.0.10-6.el9.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228011002" comment="fribidi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228011003" comment="fribidi-devel is earlier than 0:1.0.10-6.el9.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228011004" comment="fribidi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228054" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:8054: webkit2gtk3 security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:8054" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8054"/>
        <reference ref_id="CVE-2022-22624" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-22624"/>
        <reference ref_id="CVE-2022-22628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-22628"/>
        <reference ref_id="CVE-2022-22629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-22629"/>
        <reference ref_id="CVE-2022-22662" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-22662"/>
        <reference ref_id="CVE-2022-26700" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26700"/>
        <reference ref_id="CVE-2022-26709" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26709"/>
        <reference ref_id="CVE-2022-26710" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26710"/>
        <reference ref_id="CVE-2022-26716" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26716"/>
        <reference ref_id="CVE-2022-26717" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26717"/>
        <reference ref_id="CVE-2022-26719" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26719"/>
        <reference ref_id="CVE-2022-30293" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30293"/>
        <reference ref_id="ALSA-2022:8054" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8054.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2073893" id="2073893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073896" id="2073896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073899" id="2073899"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2082548" id="2082548"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092732" id="2092732"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092733" id="2092733"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092734" id="2092734"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092735" id="2092735"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2092736" id="2092736"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2104787" id="2104787"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2104789" id="2104789"></bugzilla>
          <cve public="20220408" href="https://access.redhat.com/security/cve/CVE-2022-22624" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-22624</cve>
          <cve public="20220408" href="https://access.redhat.com/security/cve/CVE-2022-22628" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-22628</cve>
          <cve public="20220408" href="https://access.redhat.com/security/cve/CVE-2022-22629" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-22629</cve>
          <cve public="20220705" href="https://access.redhat.com/security/cve/CVE-2022-22662" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2022-22662</cve>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-26700" impact="Moderate" cwe="CWE-1173" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26700</cve>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-26709" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26709</cve>
          <cve public="20220705" href="https://access.redhat.com/security/cve/CVE-2022-26710" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26710</cve>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-26716" impact="Moderate" cwe="CWE-1173" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26716</cve>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-26717" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26717</cve>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-26719" impact="Moderate" cwe="CWE-1173" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26719</cve>
          <cve public="20220506" href="https://access.redhat.com/security/cve/CVE-2022-30293" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-30293</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228054001" comment="webkit2gtk3 is earlier than 0:2.36.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228054003" comment="webkit2gtk3-devel is earlier than 0:2.36.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228054005" comment="webkit2gtk3-jsc is earlier than 0:2.36.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228054007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.36.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228062" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:8062: unbound security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8062" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8062"/>
        <reference ref_id="CVE-2022-30698" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30698"/>
        <reference ref_id="CVE-2022-30699" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30699"/>
        <reference ref_id="ALSA-2022:8062" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8062.html"/>
        <description>The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. 

The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2087120)

Security Fix(es):

* unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30699)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2116725" id="2116725"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2116729" id="2116729"></bugzilla>
          <cve public="20220801" href="https://access.redhat.com/security/cve/CVE-2022-30698" impact="Moderate" cwe="CWE-613" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30698</cve>
          <cve public="20220801" href="https://access.redhat.com/security/cve/CVE-2022-30699" impact="Moderate" cwe="CWE-613" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30699</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062001" comment="python3-unbound is earlier than 0:1.16.2-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062002" comment="python3-unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062003" comment="unbound is earlier than 0:1.16.2-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062004" comment="unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062009" comment="unbound-devel is earlier than 0:1.16.2-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062006" comment="unbound-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062010" comment="unbound-libs is earlier than 0:1.16.2-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062008" comment="unbound-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228067" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8067: httpd security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8067" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8067"/>
        <reference ref_id="CVE-2022-22719" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-22719"/>
        <reference ref_id="CVE-2022-22721" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-22721"/>
        <reference ref_id="CVE-2022-23943" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23943"/>
        <reference ref_id="CVE-2022-26377" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26377"/>
        <reference ref_id="CVE-2022-28614" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28614"/>
        <reference ref_id="CVE-2022-28615" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28615"/>
        <reference ref_id="CVE-2022-29404" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29404"/>
        <reference ref_id="CVE-2022-30522" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30522"/>
        <reference ref_id="CVE-2022-30556" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30556"/>
        <reference ref_id="CVE-2022-31813" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31813"/>
        <reference ref_id="ALSA-2022:8067" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8067.html"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)

Security Fix(es):

* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2064319" id="2064319"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064320" id="2064320"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064322" id="2064322"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2094997" id="2094997"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2095002" id="2095002"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2095006" id="2095006"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2095012" id="2095012"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2095015" id="2095015"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2095018" id="2095018"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2095020" id="2095020"></bugzilla>
          <cve public="20220314" href="https://access.redhat.com/security/cve/CVE-2022-22719" impact="Moderate" cwe="CWE-665-&gt;CWE-908" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-22719</cve>
          <cve public="20220314" href="https://access.redhat.com/security/cve/CVE-2022-22721" impact="Moderate" cwe="CWE-190-&gt;CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H">CVE-2022-22721</cve>
          <cve public="20220314" href="https://access.redhat.com/security/cve/CVE-2022-23943" impact="Important" cwe="(CWE-190|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-23943</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-26377" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L">CVE-2022-26377</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-28614" impact="Low" cwe="CWE-190-&gt;CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-28614</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-28615" impact="Low" cwe="CWE-190-&gt;CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H">CVE-2022-28615</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-29404" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-29404</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-30522" impact="Moderate" cwe="(CWE-770|CWE-789)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30522</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-30556" impact="Low" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30556</cve>
          <cve public="20220608" href="https://access.redhat.com/security/cve/CVE-2022-31813" impact="Moderate" cwe="(CWE-345|CWE-348)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2022-31813</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067001" comment="httpd is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726022" comment="httpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067003" comment="httpd-core is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726023" comment="httpd-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067005" comment="httpd-devel is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726024" comment="httpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067011" comment="httpd-tools is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726025" comment="httpd-tools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067013" comment="mod_ldap is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726026" comment="mod_ldap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067015" comment="mod_lua is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726027" comment="mod_lua is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067017" comment="mod_proxy_html is earlier than 1:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726028" comment="mod_proxy_html is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067019" comment="mod_session is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726029" comment="mod_session is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067021" comment="mod_ssl is earlier than 1:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726030" comment="mod_ssl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067007" comment="httpd-filesystem is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726031" comment="httpd-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228067009" comment="httpd-manual is earlier than 0:2.4.53-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726032" comment="httpd-manual is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228068" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8068: bind security update (Moderate)</title>
        <reference ref_id="RHSA-2022:8068" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8068"/>
        <reference ref_id="CVE-2021-25220" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-25220"/>
        <reference ref_id="CVE-2022-0396" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0396"/>
        <reference ref_id="ALSA-2022:8068" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8068.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2064512" id="2064512"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064513" id="2064513"></bugzilla>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2021-25220" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N">CVE-2021-25220</cve>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-0396" impact="Moderate" cwe="CWE-404-&gt;CWE-459" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-0396</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068001" comment="bind is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068003" comment="bind-chroot is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068020" comment="bind-devel is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068009" comment="bind-dnssec-utils is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068021" comment="bind-libs is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068017" comment="bind-utils is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068007" comment="bind-dnssec-doc is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068011" comment="bind-doc is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068012" comment="bind-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068015" comment="bind-license is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068019" comment="python3-bind is earlier than 32:9.16.23-5.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228070" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8070: dnsmasq security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:8070" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8070"/>
        <reference ref_id="CVE-2022-0934" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0934"/>
        <reference ref_id="ALSA-2022:8070" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8070.html"/>
        <description>The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2057075" id="2057075"></bugzilla>
          <cve public="20220328" href="https://access.redhat.com/security/cve/CVE-2022-0934" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L">CVE-2022-0934</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070001" comment="dnsmasq is earlier than 0:2.85-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070002" comment="dnsmasq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070003" comment="dnsmasq-utils is earlier than 0:2.85-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070004" comment="dnsmasq-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228078" version="638" class="patch">
      <metadata>
        <title>ALSA-2022:8078: flac security update (Moderate)</title>
        <reference ref_id="RHSA-2022:8078" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8078"/>
        <reference ref_id="CVE-2021-0561" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-0561"/>
        <reference ref_id="ALSA-2022:8078" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8078.html"/>
        <description>FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files.

Security Fix(es):

* flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c (CVE-2021-0561)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2057776" id="2057776"></bugzilla>
          <cve public="20220223" href="https://access.redhat.com/security/cve/CVE-2021-0561" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2021-0561</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078001" comment="flac is earlier than 0:1.3.3-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078002" comment="flac is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078007" comment="flac-devel is earlier than 0:1.3.3-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078004" comment="flac-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078008" comment="flac-libs is earlier than 0:1.3.3-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078006" comment="flac-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228090" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8090: runc security update (Low)</title>
        <reference ref_id="RHSA-2022:8090" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8090"/>
        <reference ref_id="CVE-2022-29162" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29162"/>
        <reference ref_id="ALSA-2022:8090" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8090.html"/>
        <description>The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2086398" id="2086398"></bugzilla>
          <cve public="20220513" href="https://access.redhat.com/security/cve/CVE-2022-29162" impact="Low" cwe="CWE-276" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2022-29162</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20228090001" comment="runc is earlier than 4:1.1.4-1.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244762002" comment="runc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228096" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8096: redis security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2022:8096" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8096"/>
        <reference ref_id="CVE-2022-24735" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24735"/>
        <reference ref_id="CVE-2022-24736" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24736"/>
        <reference ref_id="ALSA-2022:8096" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8096.html"/>
        <description>Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.

Security Fix(es):

* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2080286" id="2080286"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2080289" id="2080289"></bugzilla>
          <cve public="20220427" href="https://access.redhat.com/security/cve/CVE-2022-24735" impact="Low" cwe="CWE-94" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N">CVE-2022-24735</cve>
          <cve public="20220427" href="https://access.redhat.com/security/cve/CVE-2022-24736" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2022-24736</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228096001" comment="redis is earlier than 0:6.2.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228096002" comment="redis is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228096007" comment="redis-devel is earlier than 0:6.2.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228096004" comment="redis-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228096005" comment="redis-doc is earlier than 0:6.2.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228096006" comment="redis-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228098" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8098: toolbox security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:8098" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8098"/>
        <reference ref_id="CVE-2022-1705" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1705"/>
        <reference ref_id="CVE-2022-30630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30630"/>
        <reference ref_id="CVE-2022-30631" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30631"/>
        <reference ref_id="CVE-2022-30632" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30632"/>
        <reference ref_id="ALSA-2022:8098" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8098.html"/>
        <description>Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.

Security Fix(es):

* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2107342" id="2107342"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107371" id="2107371"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107374" id="2107374"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107386" id="2107386"></bugzilla>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-1705" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-1705</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30630" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30630</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30631" impact="Important" cwe="CWE-1325" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30631</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30632" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30632</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098001" comment="toolbox is earlier than 0:0.0.99.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098002" comment="toolbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098003" comment="toolbox-tests is earlier than 0:0.0.99.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098004" comment="toolbox-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228100" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8100: swtpm security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2022:8100" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8100"/>
        <reference ref_id="CVE-2022-23645" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23645"/>
        <reference ref_id="ALSA-2022:8100" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8100.html"/>
        <description>SWTPM is a TPM emulator built on libtpms providing TPM functionality for QEMU VMs.

Security Fix(es):

* swtpm: Unchecked header size indicator against expected size (CVE-2022-23645)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2056491" id="2056491"></bugzilla>
          <cve public="20220218" href="https://access.redhat.com/security/cve/CVE-2022-23645" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-23645</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228100001" comment="swtpm is earlier than 0:0.7.0-3.20211109gitb79fd91.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228100002" comment="swtpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228100003" comment="swtpm-libs is earlier than 0:0.7.0-3.20211109gitb79fd91.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228100004" comment="swtpm-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228100005" comment="swtpm-tools is earlier than 0:0.7.0-3.20211109gitb79fd91.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228100006" comment="swtpm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228139" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8139: wavpack security update (Low)</title>
        <reference ref_id="RHSA-2022:8139" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8139"/>
        <reference ref_id="CVE-2021-44269" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-44269"/>
        <reference ref_id="ALSA-2022:8139" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8139.html"/>
        <description>WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. 

Security Fix(es):

* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2064457" id="2064457"></bugzilla>
          <cve public="20211123" href="https://access.redhat.com/security/cve/CVE-2021-44269" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L">CVE-2021-44269</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228139001" comment="wavpack is earlier than 0:5.4.0-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228139002" comment="wavpack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228139003" comment="wavpack-devel is earlier than 0:5.4.0-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228139004" comment="wavpack-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228151" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8151: poppler security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:8151" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8151"/>
        <reference ref_id="CVE-2022-27337" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27337"/>
        <reference ref_id="ALSA-2022:8151" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8151.html"/>
        <description>Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.

Security Fix(es):

* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2087190" id="2087190"></bugzilla>
          <cve public="20220513" href="https://access.redhat.com/security/cve/CVE-2022-27337" impact="Moderate" cwe="CWE-1173" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-27337</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151001" comment="poppler is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151002" comment="poppler is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151003" comment="poppler-cpp is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151004" comment="poppler-cpp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151005" comment="poppler-cpp-devel is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151006" comment="poppler-cpp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151007" comment="poppler-devel is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151008" comment="poppler-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151009" comment="poppler-glib is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151010" comment="poppler-glib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151011" comment="poppler-glib-devel is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151012" comment="poppler-glib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151013" comment="poppler-qt5 is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151014" comment="poppler-qt5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151015" comment="poppler-qt5-devel is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151016" comment="poppler-qt5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151019" comment="poppler-utils is earlier than 0:21.01.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151018" comment="poppler-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228162" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8162: 389-ds-base security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8162" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8162"/>
        <reference ref_id="CVE-2022-0918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0918"/>
        <reference ref_id="CVE-2022-0996" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0996"/>
        <reference ref_id="CVE-2022-2850" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2850"/>
        <reference ref_id="ALSA-2022:8162" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8162.html"/>
        <description>389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

The following packages have been upgraded to a later upstream version: 389-ds-base (2.1.3). (BZ#2061801)

Security Fix(es):

* 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918)
* 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850)
* 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2055815" id="2055815"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2064769" id="2064769"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2118691" id="2118691"></bugzilla>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2022-0918" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-0918</cve>
          <cve public="20220321" href="https://access.redhat.com/security/cve/CVE-2022-0996" impact="Low" cwe="CWE-287" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N">CVE-2022-0996</cve>
          <cve public="20220804" href="https://access.redhat.com/security/cve/CVE-2022-2850" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2850</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162001" comment="389-ds-base is earlier than 0:2.1.3-4.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162002" comment="389-ds-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162003" comment="389-ds-base-libs is earlier than 0:2.1.3-4.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162004" comment="389-ds-base-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162005" comment="python3-lib389 is earlier than 0:2.1.3-4.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162006" comment="python3-lib389 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228197" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8197: php security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8197" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8197"/>
        <reference ref_id="CVE-2021-21708" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-21708"/>
        <reference ref_id="CVE-2022-31625" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31625"/>
        <reference ref_id="ALSA-2022:8197" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8197.html"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752)

Security Fix(es):

* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2055879" id="2055879"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2098521" id="2098521"></bugzilla>
          <cve public="20220217" href="https://access.redhat.com/security/cve/CVE-2021-21708" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2021-21708</cve>
          <cve public="20220516" href="https://access.redhat.com/security/cve/CVE-2022-31625" impact="Moderate" cwe="CWE-824" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2022-31625</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197001" comment="php is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904002" comment="php is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197003" comment="php-bcmath is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904004" comment="php-bcmath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197005" comment="php-cli is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904006" comment="php-cli is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197007" comment="php-common is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904008" comment="php-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197009" comment="php-dba is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904010" comment="php-dba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197011" comment="php-dbg is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904012" comment="php-dbg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197013" comment="php-devel is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904014" comment="php-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197015" comment="php-embedded is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904016" comment="php-embedded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197017" comment="php-enchant is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904018" comment="php-enchant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197019" comment="php-ffi is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904020" comment="php-ffi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197021" comment="php-fpm is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904022" comment="php-fpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197023" comment="php-gd is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904024" comment="php-gd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197025" comment="php-gmp is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904026" comment="php-gmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197027" comment="php-intl is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904028" comment="php-intl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197029" comment="php-ldap is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904030" comment="php-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197031" comment="php-mbstring is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904032" comment="php-mbstring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197033" comment="php-mysqlnd is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904034" comment="php-mysqlnd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197035" comment="php-odbc is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904036" comment="php-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197037" comment="php-opcache is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904038" comment="php-opcache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197039" comment="php-pdo is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904040" comment="php-pdo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197041" comment="php-pgsql is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904042" comment="php-pgsql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197043" comment="php-process is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904044" comment="php-process is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197045" comment="php-snmp is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904046" comment="php-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197047" comment="php-soap is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904048" comment="php-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228197049" comment="php-xml is earlier than 0:8.0.20-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904050" comment="php-xml is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228207" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:8207: openjpeg2 security update (Low)</title>
        <reference ref_id="RHSA-2022:8207" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8207"/>
        <reference ref_id="CVE-2022-1122" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1122"/>
        <reference ref_id="ALSA-2022:8207" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8207.html"/>
        <description>OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.

Security Fix(es):

* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2067052" id="2067052"></bugzilla>
          <cve public="20210713" href="https://access.redhat.com/security/cve/CVE-2022-1122" impact="Low" cwe="CWE-665-&gt;CWE-824" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1122</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228207001" comment="openjpeg2 is earlier than 0:2.4.0-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228207002" comment="openjpeg2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228207003" comment="openjpeg2-devel is earlier than 0:2.4.0-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228207004" comment="openjpeg2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228207005" comment="openjpeg2-tools is earlier than 0:2.4.0-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228207006" comment="openjpeg2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228208" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8208: dovecot security and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8208" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8208"/>
        <reference ref_id="CVE-2022-30550" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30550"/>
        <reference ref_id="ALSA-2022:8208" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8208.html"/>
        <description>Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. 

Security Fix(es):

* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2105070" id="2105070"></bugzilla>
          <cve public="20220706" href="https://access.redhat.com/security/cve/CVE-2022-30550" impact="Moderate" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2022-30550</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208001" comment="dovecot is earlier than 1:2.3.16-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208002" comment="dovecot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208003" comment="dovecot-devel is earlier than 1:2.3.16-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208004" comment="dovecot-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208011" comment="dovecot-mysql is earlier than 1:2.3.16-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208006" comment="dovecot-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208012" comment="dovecot-pgsql is earlier than 1:2.3.16-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208008" comment="dovecot-pgsql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208013" comment="dovecot-pigeonhole is earlier than 1:2.3.16-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228208010" comment="dovecot-pigeonhole is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228221" version="638" class="patch">
      <metadata>
        <title>ALSA-2022:8221: xorg-x11-server security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:8221" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8221"/>
        <reference ref_id="CVE-2022-2319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2319"/>
        <reference ref_id="CVE-2022-2320" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2320"/>
        <reference ref_id="ALSA-2022:8221" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8221.html"/>
        <description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2106671" id="2106671"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106683" id="2106683"></bugzilla>
          <cve public="20220713" href="https://access.redhat.com/security/cve/CVE-2022-2319" impact="Moderate" cwe="CWE-1320" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L">CVE-2022-2319</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-2320" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2320</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221001" comment="xorg-x11-server-Xdmx is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221002" comment="xorg-x11-server-Xdmx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221003" comment="xorg-x11-server-Xephyr is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221004" comment="xorg-x11-server-Xephyr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221005" comment="xorg-x11-server-Xnest is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221006" comment="xorg-x11-server-Xnest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221007" comment="xorg-x11-server-Xorg is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221008" comment="xorg-x11-server-Xorg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221009" comment="xorg-x11-server-Xvfb is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221010" comment="xorg-x11-server-Xvfb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221011" comment="xorg-x11-server-common is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221012" comment="xorg-x11-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221017" comment="xorg-x11-server-devel is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221014" comment="xorg-x11-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221015" comment="xorg-x11-server-source is earlier than 0:1.20.11-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221016" comment="xorg-x11-server-source is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228250" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8250: grafana-pcp security update (Moderate)</title>
        <reference ref_id="ALSA-2022:8250" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8250.html"/>
        <reference ref_id="RHSA-2022:8250" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8250"/>
        <reference ref_id="CVE-2022-1705" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1705"/>
        <reference ref_id="CVE-2022-30630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30630"/>
        <reference ref_id="CVE-2022-30631" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30631"/>
        <reference ref_id="CVE-2022-30632" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30632"/>
        <reference ref_id="CVE-2022-30635" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30635"/>
        <reference ref_id="CVE-2022-32148" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32148"/>
        <description>The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.

Security Fix(es):

* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2107388" id="2107388"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107386" id="2107386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107342" id="2107342"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107371" id="2107371"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107374" id="2107374"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107383" id="2107383"></bugzilla>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-1705" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-1705</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30630" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30630</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30631" impact="Important" cwe="CWE-1325" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30631</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30632" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30632</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30635" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30635</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-32148" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-32148</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20228250001" comment="grafana-pcp is earlier than 0:3.2.0-3.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20246946002" comment="grafana-pcp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228263" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8263: dpdk security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2022:8263" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8263"/>
        <reference ref_id="CVE-2021-3839" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3839"/>
        <reference ref_id="CVE-2022-2132" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2132"/>
        <reference ref_id="CVE-2022-28199" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28199"/>
        <reference ref_id="ALSA-2022:8263" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8263.html"/>
        <description>The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.

Security Fix(es):

* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
* DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash (CVE-2021-3839)
* dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service (CVE-2022-28199)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2025882" id="2025882"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2099475" id="2099475"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123549" id="2123549"></bugzilla>
          <cve public="20220429" href="https://access.redhat.com/security/cve/CVE-2021-3839" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L">CVE-2021-3839</cve>
          <cve public="20220829" href="https://access.redhat.com/security/cve/CVE-2022-2132" impact="Important" cwe="CWE-791-&gt;CWE-183-&gt;CWE-641-&gt;CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H">CVE-2022-2132</cve>
          <cve public="20220830" href="https://access.redhat.com/security/cve/CVE-2022-28199" impact="Moderate" cwe="CWE-393" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-28199</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263001" comment="dpdk is earlier than 2:21.11.2-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263002" comment="dpdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263003" comment="dpdk-devel is earlier than 2:21.11.2-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263004" comment="dpdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263007" comment="dpdk-tools is earlier than 2:21.11.2-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263008" comment="dpdk-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263005" comment="dpdk-doc is earlier than 2:21.11.2-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228263006" comment="dpdk-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228267" version="640" class="patch">
      <metadata>
        <title>ALSA-2022:8267: kernel security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="ALSA-2022:8267" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8267.html"/>
        <reference ref_id="RHSA-2022:8267" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8267"/>
        <reference ref_id="CVE-2020-36516" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-36516"/>
        <reference ref_id="CVE-2021-3640" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3640"/>
        <reference ref_id="CVE-2022-0168" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0168"/>
        <reference ref_id="CVE-2022-0617" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0617"/>
        <reference ref_id="CVE-2022-0854" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-0854"/>
        <reference ref_id="CVE-2022-1016" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1016"/>
        <reference ref_id="CVE-2022-1048" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1048"/>
        <reference ref_id="CVE-2022-1184" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1184"/>
        <reference ref_id="CVE-2022-1280" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1280"/>
        <reference ref_id="CVE-2022-1353" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1353"/>
        <reference ref_id="CVE-2022-1679" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1679"/>
        <reference ref_id="CVE-2022-1852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1852"/>
        <reference ref_id="CVE-2022-1998" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1998"/>
        <reference ref_id="CVE-2022-20368" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-20368"/>
        <reference ref_id="CVE-2022-21123" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21123"/>
        <reference ref_id="CVE-2022-21125" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21125"/>
        <reference ref_id="CVE-2022-21166" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21166"/>
        <reference ref_id="CVE-2022-21499" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21499"/>
        <reference ref_id="CVE-2022-23816" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23816"/>
        <reference ref_id="CVE-2022-23825" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23825"/>
        <reference ref_id="CVE-2022-24448" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24448"/>
        <reference ref_id="CVE-2022-2586" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2586"/>
        <reference ref_id="CVE-2022-26373" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26373"/>
        <reference ref_id="CVE-2022-2639" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2639"/>
        <reference ref_id="CVE-2022-28390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28390"/>
        <reference ref_id="CVE-2022-28893" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28893"/>
        <reference ref_id="CVE-2022-29581" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29581"/>
        <reference ref_id="CVE-2022-29900" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29900"/>
        <reference ref_id="CVE-2022-29901" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29901"/>
        <reference ref_id="CVE-2022-36946" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36946"/>
        <reference ref_id="CVE-2022-39190" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39190"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280)
* kernel info leak issue in pfkey_register (CVE-2022-1353)
* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
* incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
* incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
* AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)
* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nf_tables disallow binding to already bound chain (CVE-2022-39190)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2103148" id="2103148"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2103153" id="2103153"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114878" id="2114878"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115065" id="2115065"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2115278" id="2115278"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123695" id="2123695"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2129152" id="2129152"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2084479" id="2084479"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2088021" id="2088021"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2089815" id="2089815"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090226" id="2090226"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090237" id="2090237"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090240" id="2090240"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090241" id="2090241"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1980646" id="1980646"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2037386" id="2037386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2051444" id="2051444"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2052312" id="2052312"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2053632" id="2053632"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2058395" id="2058395"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2059928" id="2059928"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2066614" id="2066614"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2066706" id="2066706"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2066819" id="2066819"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2070205" id="2070205"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2071022" id="2071022"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073064" id="2073064"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2074208" id="2074208"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2084125" id="2084125"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2084183" id="2084183"></bugzilla>
          <cve public="20220228" href="https://access.redhat.com/security/cve/CVE-2020-36516" impact="Moderate" cwe="CWE-290" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L">CVE-2020-36516</cve>
          <cve public="20210718" href="https://access.redhat.com/security/cve/CVE-2021-3640" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2021-3640</cve>
          <cve public="20220309" href="https://access.redhat.com/security/cve/CVE-2022-0168" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-0168</cve>
          <cve public="20220124" href="https://access.redhat.com/security/cve/CVE-2022-0617" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-0617</cve>
          <cve public="20220307" href="https://access.redhat.com/security/cve/CVE-2022-0854" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-0854</cve>
          <cve public="20220328" href="https://access.redhat.com/security/cve/CVE-2022-1016" impact="Moderate" cwe="CWE-824" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-1016</cve>
          <cve public="20220323" href="https://access.redhat.com/security/cve/CVE-2022-1048" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1048</cve>
          <cve public="20220418" href="https://access.redhat.com/security/cve/CVE-2022-1184" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1184</cve>
          <cve public="20220407" href="https://access.redhat.com/security/cve/CVE-2022-1280" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1280</cve>
          <cve public="20220321" href="https://access.redhat.com/security/cve/CVE-2022-1353" impact="Moderate" cwe="CWE-212" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H">CVE-2022-1353</cve>
          <cve public="20220207" href="https://access.redhat.com/security/cve/CVE-2022-1679" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1679</cve>
          <cve public="20220601" href="https://access.redhat.com/security/cve/CVE-2022-1852" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-1852</cve>
          <cve public="20220127" href="https://access.redhat.com/security/cve/CVE-2022-1998" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1998</cve>
          <cve public="20220315" href="https://access.redhat.com/security/cve/CVE-2022-20368" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-20368</cve>
          <cve public="20220614" href="https://access.redhat.com/security/cve/CVE-2022-21123" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N">CVE-2022-21123</cve>
          <cve public="20220614" href="https://access.redhat.com/security/cve/CVE-2022-21125" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-21125</cve>
          <cve public="20220614" href="https://access.redhat.com/security/cve/CVE-2022-21166" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-21166</cve>
          <cve public="20220524" href="https://access.redhat.com/security/cve/CVE-2022-21499" impact="Moderate" cwe="(CWE-267|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-21499</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-23816" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-23816</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-23825" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-23825</cve>
          <cve public="20220204" href="https://access.redhat.com/security/cve/CVE-2022-24448" impact="Low" cwe="CWE-908" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2022-24448</cve>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-2586" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2586</cve>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-26373" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-26373</cve>
          <cve public="20220415" href="https://access.redhat.com/security/cve/CVE-2022-2639" impact="Moderate" cwe="CWE-192-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2639</cve>
          <cve public="20220404" href="https://access.redhat.com/security/cve/CVE-2022-28390" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-28390</cve>
          <cve public="20220411" href="https://access.redhat.com/security/cve/CVE-2022-28893" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-28893</cve>
          <cve public="20220415" href="https://access.redhat.com/security/cve/CVE-2022-29581" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-29581</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-29900" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-29900</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-29901" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-29901</cve>
          <cve public="20220726" href="https://access.redhat.com/security/cve/CVE-2022-36946" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-36946</cve>
          <cve public="20220821" href="https://access.redhat.com/security/cve/CVE-2022-39190" impact="Moderate" cwe="CWE-392" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39190</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267001" comment="bpftool is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267003" comment="kernel is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267007" comment="kernel-core is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267009" comment="kernel-cross-headers is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267011" comment="kernel-debug is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267013" comment="kernel-debug-core is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267015" comment="kernel-debug-devel is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267019" comment="kernel-debug-modules is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267023" comment="kernel-devel is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267025" comment="kernel-devel-matched is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267029" comment="kernel-headers is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267031" comment="kernel-modules is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267033" comment="kernel-modules-extra is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267035" comment="kernel-tools is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267056" comment="kernel-tools-libs is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267057" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267058" comment="kernel-zfcpdump is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267059" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267060" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267061" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267062" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267063" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267053" comment="perf is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267055" comment="python3-perf is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228267027" comment="kernel-doc is earlier than 0:5.14.0-162.6.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228291" version="637" class="patch">
      <metadata>
        <title>ALSA-2022:8291: rsync security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2022:8291" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8291"/>
        <reference ref_id="CVE-2022-37434" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-37434"/>
        <reference ref_id="ALSA-2022:8291" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8291.html"/>
        <description>The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.

Security Fix(es):

* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2116639" id="2116639"></bugzilla>
          <cve public="20220805" href="https://access.redhat.com/security/cve/CVE-2022-37434" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2022-37434</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228291001" comment="rsync is earlier than 0:3.2.3-18.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224592002" comment="rsync is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228291003" comment="rsync-daemon is earlier than 0:3.2.3-18.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224592004" comment="rsync-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228299" version="639" class="patch">
      <metadata>
        <title>ALSA-2022:8299: curl security update (Low)</title>
        <reference ref_id="RHSA-2022:8299" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8299"/>
        <reference ref_id="CVE-2022-27775" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27775"/>
        <reference ref_id="ALSA-2022:8299" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8299.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: bad local IPv6 connection reuse (CVE-2022-27775)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2078388" id="2078388"></bugzilla>
          <cve public="20220427" href="https://access.redhat.com/security/cve/CVE-2022-27775" impact="Low" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-27775</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228299001" comment="curl is earlier than 0:7.76.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228299003" comment="curl-minimal is earlier than 0:7.76.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228299010" comment="libcurl is earlier than 0:7.76.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228299011" comment="libcurl-devel is earlier than 0:7.76.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228299012" comment="libcurl-minimal is earlier than 0:7.76.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228317" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8317: samba security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8317" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8317"/>
        <reference ref_id="CVE-2022-32742" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32742"/>
        <reference ref_id="ALSA-2022:8317" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8317.html"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.16.4). (BZ#2077487)

Security Fix(es):

* samba: server memory information leak via SMB1 (CVE-2022-32742)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2108196" id="2108196"></bugzilla>
          <cve public="20220727" href="https://access.redhat.com/security/cve/CVE-2022-32742" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2022-32742</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317001" comment="ctdb is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317002" comment="ctdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317049" comment="libsmbclient is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317004" comment="libsmbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317050" comment="libsmbclient-devel is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317006" comment="libsmbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317051" comment="libwbclient is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317008" comment="libwbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317052" comment="libwbclient-devel is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317010" comment="libwbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317053" comment="python3-samba is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317012" comment="python3-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317054" comment="samba is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317014" comment="samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317055" comment="samba-client is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317016" comment="samba-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317056" comment="samba-client-libs is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317018" comment="samba-client-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317057" comment="samba-common-libs is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317022" comment="samba-common-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317058" comment="samba-common-tools is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317024" comment="samba-common-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317059" comment="samba-devel is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317026" comment="samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317060" comment="samba-krb5-printing is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317028" comment="samba-krb5-printing is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317061" comment="samba-libs is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317030" comment="samba-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317062" comment="samba-test is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317034" comment="samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317063" comment="samba-test-libs is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317036" comment="samba-test-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317064" comment="samba-vfs-iouring is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317038" comment="samba-vfs-iouring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317065" comment="samba-winbind is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317040" comment="samba-winbind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317066" comment="samba-winbind-clients is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317042" comment="samba-winbind-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317067" comment="samba-winbind-krb5-locator is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317044" comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317068" comment="samba-winbind-modules is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317046" comment="samba-winbind-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317069" comment="samba-winexe is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317048" comment="samba-winexe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317019" comment="samba-common is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317020" comment="samba-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317031" comment="samba-pidl is earlier than 0:4.16.4-101.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317032" comment="samba-pidl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228353" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8353: python3.9 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8353" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8353"/>
        <reference ref_id="CVE-2015-20107" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2015-20107"/>
        <reference ref_id="CVE-2021-28861" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-28861"/>
        <reference ref_id="ALSA-2022:8353" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8353.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

The following packages have been upgraded to a later upstream version: python3.9 (3.9.14). (BZ#2128249)

Security Fix(es):

* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2075390" id="2075390"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2120642" id="2120642"></bugzilla>
          <cve public="20150802" href="https://access.redhat.com/security/cve/CVE-2015-20107" impact="Moderate" cwe="CWE-20-&gt;CWE-77" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L">CVE-2015-20107</cve>
          <cve public="20220822" href="https://access.redhat.com/security/cve/CVE-2021-28861" impact="Moderate" cwe="CWE-601" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N">CVE-2021-28861</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353003" comment="python3 is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353005" comment="python3-debug is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353007" comment="python3-devel is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353009" comment="python3-idle is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353011" comment="python3-libs is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353013" comment="python3-test is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353015" comment="python3-tkinter is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228353001" comment="python-unversioned-command is earlier than 0:3.9.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228361" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8361: e2fsprogs security update (Moderate)</title>
        <reference ref_id="RHSA-2022:8361" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8361"/>
        <reference ref_id="CVE-2022-1304" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1304"/>
        <reference ref_id="ALSA-2022:8361" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8361.html"/>
        <description>The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.

Security Fix(es):

* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2069726" id="2069726"></bugzilla>
          <cve public="20220324" href="https://access.redhat.com/security/cve/CVE-2022-1304" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2022-1304</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361001" comment="e2fsprogs is earlier than 0:1.46.5-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361002" comment="e2fsprogs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361013" comment="e2fsprogs-devel is earlier than 0:1.46.5-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361004" comment="e2fsprogs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361014" comment="e2fsprogs-libs is earlier than 0:1.46.5-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361006" comment="e2fsprogs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361015" comment="libcom_err is earlier than 0:1.46.5-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361008" comment="libcom_err is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361016" comment="libcom_err-devel is earlier than 0:1.46.5-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361010" comment="libcom_err-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361017" comment="libss is earlier than 0:1.46.5-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228361012" comment="libss is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228384" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8384: harfbuzz security update (Moderate)</title>
        <reference ref_id="RHSA-2022:8384" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8384"/>
        <reference ref_id="CVE-2022-33068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-33068"/>
        <reference ref_id="ALSA-2022:8384" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8384.html"/>
        <description>HarfBuzz is an implementation of the OpenType Layout engine.

Security Fix(es):

* harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc (CVE-2022-33068)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2102608" id="2102608"></bugzilla>
          <cve public="20220623" href="https://access.redhat.com/security/cve/CVE-2022-33068" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-33068</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384001" comment="harfbuzz is earlier than 0:2.7.4-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384002" comment="harfbuzz is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384003" comment="harfbuzz-devel is earlier than 0:2.7.4-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384004" comment="harfbuzz-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384005" comment="harfbuzz-icu is earlier than 0:2.7.4-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384006" comment="harfbuzz-icu is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228385" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8385: dhcp security and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8385" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8385"/>
        <reference ref_id="CVE-2021-25220" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-25220"/>
        <reference ref_id="ALSA-2022:8385" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8385.html"/>
        <description>The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.

Security Fix(es):

* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2064512" id="2064512"></bugzilla>
          <cve public="20220316" href="https://access.redhat.com/security/cve/CVE-2021-25220" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N">CVE-2021-25220</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385001" comment="dhcp-client is earlier than 12:4.4.2-17.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385002" comment="dhcp-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385005" comment="dhcp-relay is earlier than 12:4.4.2-17.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385006" comment="dhcp-relay is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385007" comment="dhcp-server is earlier than 12:4.4.2-17.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385008" comment="dhcp-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385003" comment="dhcp-common is earlier than 12:4.4.2-17.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385004" comment="dhcp-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228415" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:8415: mingw-gcc security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2022:8415" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8415"/>
        <reference ref_id="CVE-2021-46195" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46195"/>
        <reference ref_id="ALSA-2022:8415" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8415.html"/>
        <description>The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.

Security Fix(es):

* gcc: uncontrolled recursion in libiberty/rust-demangle.c (CVE-2021-46195)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2046300" id="2046300"></bugzilla>
          <cve public="20210129" href="https://access.redhat.com/security/cve/CVE-2021-46195" impact="Low" cwe="CWE-674" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2021-46195</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415001" comment="mingw32-cpp is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415002" comment="mingw32-cpp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415003" comment="mingw32-gcc is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415004" comment="mingw32-gcc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415005" comment="mingw32-gcc-c++ is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415006" comment="mingw32-gcc-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415007" comment="mingw32-libgcc is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415008" comment="mingw32-libgcc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415009" comment="mingw64-cpp is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415010" comment="mingw64-cpp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415011" comment="mingw64-gcc is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415012" comment="mingw64-gcc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415013" comment="mingw64-gcc-c++ is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415014" comment="mingw64-gcc-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415015" comment="mingw64-libgcc is earlier than 0:12.0.1-11.2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228415016" comment="mingw64-libgcc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228418" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8418: mingw-glib2 security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2022:8418" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8418"/>
        <reference ref_id="CVE-2021-28153" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-28153"/>
        <reference ref_id="ALSA-2022:8418" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8418.html"/>
        <description>GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

* glib: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION creates empty target for dangling symlink (CVE-2021-28153)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1938291" id="1938291"></bugzilla>
          <cve public="20210310" href="https://access.redhat.com/security/cve/CVE-2021-28153" impact="Low" cwe="CWE-59" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2021-28153</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418001" comment="mingw32-glib2 is earlier than 0:2.70.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418002" comment="mingw32-glib2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418003" comment="mingw32-glib2-static is earlier than 0:2.70.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418004" comment="mingw32-glib2-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418005" comment="mingw64-glib2 is earlier than 0:2.70.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418006" comment="mingw64-glib2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418007" comment="mingw64-glib2-static is earlier than 0:2.70.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418008" comment="mingw64-glib2-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228420" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8420: mingw-zlib security update (Important)</title>
        <reference ref_id="RHSA-2022:8420" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8420"/>
        <reference ref_id="CVE-2018-25032" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2018-25032"/>
        <reference ref_id="ALSA-2022:8420" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8420.html"/>
        <description>The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.

Security Fix(es):

* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2067945" id="2067945"></bugzilla>
          <cve public="20180420" href="https://access.redhat.com/security/cve/CVE-2018-25032" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H">CVE-2018-25032</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420001" comment="mingw32-zlib is earlier than 0:1.2.12-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420002" comment="mingw32-zlib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420003" comment="mingw32-zlib-static is earlier than 0:1.2.12-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420004" comment="mingw32-zlib-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420005" comment="mingw64-zlib is earlier than 0:1.2.12-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420006" comment="mingw64-zlib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420007" comment="mingw64-zlib-static is earlier than 0:1.2.12-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228420008" comment="mingw64-zlib-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228431" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:8431: podman security, bug fix, and enhancement update (Low)</title>
        <reference ref_id="RHSA-2022:8431" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8431"/>
        <reference ref_id="CVE-2022-2989" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2989"/>
        <reference ref_id="CVE-2022-2990" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2990"/>
        <reference ref_id="ALSA-2022:8431" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8431.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* podman: possible information disclosure and modification (CVE-2022-2989)
* buildah: possible information disclosure and modification (CVE-2022-2990)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2120436)
* dnf-update broken for podman/catatonit (BZ#2123319)
* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2123905)
* podman kill may deadlock [AlmaLinux 9.1] (BZ#2124716)
* containers config.json gets empty after sudden power loss (BZ#2136278)
* PANIC podman API service endpoint handler panic (BZ#2136287)

Enhancement(s):

* Podman volume plugin timeout should be configurable [almalinux-9.1.0 Z] (BZ#2124676)
* [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2136281)</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2121445" id="2121445"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2121453" id="2121453"></bugzilla>
          <cve public="20220822" href="https://access.redhat.com/security/cve/CVE-2022-2989" impact="Low" cwe="CWE-842" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2022-2989</cve>
          <cve public="20220822" href="https://access.redhat.com/security/cve/CVE-2022-2990" impact="Low" cwe="CWE-842" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2022-2990</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431001" comment="podman is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431003" comment="podman-catatonit is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431004" comment="podman-catatonit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431007" comment="podman-gvproxy is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954006" comment="podman-gvproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431009" comment="podman-plugins is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431011" comment="podman-remote is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431013" comment="podman-tests is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228431005" comment="podman-docker is earlier than 2:4.2.0-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228434" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8434: dotnet7.0 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8434" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8434"/>
        <reference ref_id="CVE-2022-41032" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41032"/>
        <reference ref_id="ALSA-2022:8434" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8434.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.100 RC 2 and .NET Runtime 7.0.0 RC 2. 

The following packages have been upgraded to a later upstream version: dotnet7.0 (7.0.100). (BZ#2134641)

Security Fix(es):

* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2132614" id="2132614"></bugzilla>
          <cve public="20221011" href="https://access.redhat.com/security/cve/CVE-2022-41032" impact="Moderate" cwe="CWE-524" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-41032</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434007" comment="dotnet-host is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.100-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.100-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.0-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434019" comment="dotnet-templates-7.0 is earlier than 0:7.0.100-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.100-0.5.rc2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228444" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8444: keylime security update (Moderate)</title>
        <reference ref_id="RHSA-2022:8444" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8444"/>
        <reference ref_id="CVE-2022-3500" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3500"/>
        <reference ref_id="ALSA-2022:8444" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8444.html"/>
        <description>Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.

Security Fix(es):

* keylime: exception handling and impedance match in tornado_requests (CVE-2022-3500)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-15"/>
          <updated date="2022-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2135343" id="2135343"></bugzilla>
          <cve public="20221027" href="https://access.redhat.com/security/cve/CVE-2022-3500" impact="Moderate" cwe="CWE-248" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3500</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444001" comment="keylime is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444002" comment="keylime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444003" comment="keylime-base is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444004" comment="keylime-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444005" comment="keylime-registrar is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444006" comment="keylime-registrar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444009" comment="keylime-tenant is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444010" comment="keylime-tenant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444011" comment="keylime-verifier is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444012" comment="keylime-verifier is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444013" comment="python3-keylime is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444014" comment="python3-keylime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444007" comment="keylime-selinux is earlier than 0:6.5.1-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444008" comment="keylime-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228493" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8493: python3.9 security update (Important)</title>
        <reference ref_id="RHSA-2022:8493" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8493"/>
        <reference ref_id="CVE-2022-42919" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42919"/>
        <reference ref_id="ALSA-2022:8493" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8493.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-16"/>
          <updated date="2022-11-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2138705" id="2138705"></bugzilla>
          <cve public="20221026" href="https://access.redhat.com/security/cve/CVE-2022-42919" impact="Important" cwe="CWE-269" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-42919</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493003" comment="python3 is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493005" comment="python3-debug is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493007" comment="python3-devel is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493009" comment="python3-idle is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493011" comment="python3-libs is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493013" comment="python3-test is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493015" comment="python3-tkinter is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228493001" comment="python-unversioned-command is earlier than 0:3.9.14-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228637" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:8637: krb5 security update (Important)</title>
        <reference ref_id="RHSA-2022:8637" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8637"/>
        <reference ref_id="CVE-2022-42898" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42898"/>
        <reference ref_id="ALSA-2022:8637" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8637.html"/>
        <description>Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

Security Fix(es):

* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-28"/>
          <updated date="2022-11-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2140960" id="2140960"></bugzilla>
          <cve public="20221115" href="https://access.redhat.com/security/cve/CVE-2022-42898" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L">CVE-2022-42898</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637001" comment="krb5-devel is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637002" comment="krb5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637003" comment="krb5-libs is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637004" comment="krb5-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637005" comment="krb5-pkinit is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637006" comment="krb5-pkinit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637007" comment="krb5-server is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637008" comment="krb5-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637009" comment="krb5-server-ldap is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637010" comment="krb5-server-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637015" comment="krb5-workstation is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637012" comment="krb5-workstation is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637013" comment="libkadm5 is earlier than 0:1.19.1-24.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637014" comment="libkadm5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228643" version="635" class="patch">
      <metadata>
        <title>ALSA-2022:8643: varnish security update (Important)</title>
        <reference ref_id="RHSA-2022:8643" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8643"/>
        <reference ref_id="CVE-2022-45060" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45060"/>
        <reference ref_id="ALSA-2022:8643" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8643.html"/>
        <description>Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Security Fix(es):

* varnish: Request Forgery Vulnerability (CVE-2022-45060)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-11-28"/>
          <updated date="2022-11-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2141844" id="2141844"></bugzilla>
          <cve public="20221108" href="https://access.redhat.com/security/cve/CVE-2022-45060" impact="Important" cwe="CWE-918" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-45060</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643001" comment="varnish is earlier than 0:6.6.2-2.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643002" comment="varnish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643003" comment="varnish-devel is earlier than 0:6.6.2-2.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643004" comment="varnish-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643007" comment="varnish-docs is earlier than 0:6.6.2-2.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643006" comment="varnish-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20228832" version="636" class="patch">
      <metadata>
        <title>ALSA-2022:8832: nodejs:18 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2022:8832" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2022:8832"/>
        <reference ref_id="CVE-2022-3517" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3517"/>
        <reference ref_id="CVE-2022-43548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43548"/>
        <reference ref_id="ALSA-2022:8832" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2022-8832.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (18.12.1). (BZ#2142809, BZ#2142830, BZ#2142834, BZ#2142856)

Security Fix(es):

* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2022 AlmaLinux OS</rights>
          <issued date="2022-12-06"/>
          <updated date="2022-12-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2134609" id="2134609"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140911" id="2140911"></bugzilla>
          <cve public="20220206" href="https://access.redhat.com/security/cve/CVE-2022-3517" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3517</cve>
          <cve public="20221104" href="https://access.redhat.com/security/cve/CVE-2022-43548" impact="Moderate" cwe="CWE-350" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-43548</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228832017" comment="Module nodejs:18 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832018" comment="nodejs is earlier than 1:18.12.1-1.module_el9.1.0+16+91bc168f"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832019" comment="nodejs-devel is earlier than 1:18.12.1-1.module_el9.1.0+16+91bc168f"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832004" comment="nodejs-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832020" comment="nodejs-full-i18n is earlier than 1:18.12.1-1.module_el9.1.0+16+91bc168f"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832021" comment="npm is earlier than 1:8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832022" comment="nodejs-docs is earlier than 1:18.12.1-1.module_el9.1.0+16+91bc168f"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832023" comment="nodejs-nodemon is earlier than 0:2.0.20-1.module_el9.1.0+16+91bc168f"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595012" comment="nodejs-nodemon is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20234330022" comment="nodejs-packaging is earlier than 0:2021.06-4.module_el9.1.0+13+d9a595ea"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832012" comment="nodejs-packaging is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20234330023" comment="nodejs-packaging-bundler is earlier than 0:2021.06-4.module_el9.1.0+13+d9a595ea"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832014" comment="nodejs-packaging-bundler is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230021" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:0021: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:0021" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0021"/>
        <reference ref_id="CVE-2022-42856" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42856"/>
        <reference ref_id="ALSA-2023:0021" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0021.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-04"/>
          <updated date="2023-01-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2153683" id="2153683"></bugzilla>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-42856" impact="Important" cwe="CWE-843" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42856</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230021001" comment="webkit2gtk3 is earlier than 0:2.36.7-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230021003" comment="webkit2gtk3-devel is earlier than 0:2.36.7-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230021005" comment="webkit2gtk3-jsc is earlier than 0:2.36.7-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230021007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.36.7-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230077" version="639" class="patch">
      <metadata>
        <title>ALSA-2023:0077: .NET 6.0 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:0077" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0077"/>
        <reference ref_id="CVE-2023-21538" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21538"/>
        <reference ref_id="ALSA-2023:0077" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0077.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.

The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154459)

Security Fix(es):

* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-11"/>
          <updated date="2023-01-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2158342" id="2158342"></bugzilla>
          <cve public="20230110" href="https://access.redhat.com/security/cve/CVE-2023-21538" impact="Moderate" cwe="CWE-121" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21538</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.13-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.13-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.13-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.13-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.13-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.113-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.113-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.13-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230077017" comment="dotnet-templates-6.0 is earlier than 0:6.0.113-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230194" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:0194: java-17-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:0194" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0194"/>
        <reference ref_id="CVE-2023-21835" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21835"/>
        <reference ref_id="CVE-2023-21843" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21843"/>
        <reference ref_id="ALSA-2023:0194" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0194.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database.  This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147476)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [almalinux-9] (BZ#2153097)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2160421" id="2160421"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2160475" id="2160475"></bugzilla>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21835" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-21835</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21843" impact="Low" cwe="CWE-646" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21843</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194001" comment="java-17-openjdk is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194003" comment="java-17-openjdk-demo is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194009" comment="java-17-openjdk-devel is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194017" comment="java-17-openjdk-headless is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194027" comment="java-17-openjdk-jmods is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194035" comment="java-17-openjdk-src is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230194045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.6.0.10-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230202" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0202: java-11-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:0202" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0202"/>
        <reference ref_id="CVE-2023-21835" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21835"/>
        <reference ref_id="CVE-2023-21843" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21843"/>
        <reference ref_id="ALSA-2023:0202" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0202.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [almalinux-9] (BZ#2157798)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-18"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2160421" id="2160421"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2160475" id="2160475"></bugzilla>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21835" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-21835</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21843" impact="Low" cwe="CWE-646" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21843</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202001" comment="java-11-openjdk is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202003" comment="java-11-openjdk-demo is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202009" comment="java-11-openjdk-devel is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202017" comment="java-11-openjdk-headless is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202027" comment="java-11-openjdk-jmods is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202035" comment="java-11-openjdk-src is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230202045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.18.0.10-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230210" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:0210: java-1.8.0-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:0210" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0210"/>
        <reference ref_id="CVE-2023-21830" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21830"/>
        <reference ref_id="CVE-2023-21843" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21843"/>
        <reference ref_id="ALSA-2023:0210" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0210.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [almalinux-9] (BZ#2159912)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [almalinux-9, openjdk-8] (BZ#2163594)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-26"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2160475" id="2160475"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2160490" id="2160490"></bugzilla>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21830" impact="Moderate" cwe="CWE-502" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21830</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21843" impact="Low" cwe="CWE-646" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21843</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230210025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.362.b09-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230300" version="642" class="patch">
      <metadata>
        <title>ALSA-2023:0300: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:0300" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0300"/>
        <reference ref_id="CVE-2022-2959" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2959"/>
        <reference ref_id="CVE-2022-2964" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2964"/>
        <reference ref_id="CVE-2022-30594" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30594"/>
        <reference ref_id="CVE-2022-3077" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3077"/>
        <reference ref_id="CVE-2022-4139" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4139"/>
        <reference ref_id="CVE-2022-43945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43945"/>
        <reference ref_id="ALSA-2023:0300" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0300.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)
* kernel-rt: update RT source tree to the latest AlmaLinux-9.1.z1 Batch (BZ#2141817)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2067482" id="2067482"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2085300" id="2085300"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2103681" id="2103681"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123309" id="2123309"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2141752" id="2141752"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2147572" id="2147572"></bugzilla>
          <cve public="20220527" href="https://access.redhat.com/security/cve/CVE-2022-2959" impact="Important" cwe="CWE-667-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2959</cve>
          <cve public="20220321" href="https://access.redhat.com/security/cve/CVE-2022-2964" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2964</cve>
          <cve public="20220512" href="https://access.redhat.com/security/cve/CVE-2022-30594" impact="Moderate" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30594</cve>
          <cve public="20220602" href="https://access.redhat.com/security/cve/CVE-2022-3077" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3077</cve>
          <cve public="20221130" href="https://access.redhat.com/security/cve/CVE-2022-4139" impact="Important" cwe="CWE-281" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4139</cve>
          <cve public="20221003" href="https://access.redhat.com/security/cve/CVE-2022-43945" impact="Important" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-43945</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300024" comment="kernel-rt is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300025" comment="kernel-rt-core is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300026" comment="kernel-rt-debug is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300032" comment="kernel-rt-devel is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300033" comment="kernel-rt-kvm is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300034" comment="kernel-rt-modules is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230300035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-162.12.1.rt21.175.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230303" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0303: usbguard security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0303" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0303"/>
        <reference ref_id="CVE-2019-25058" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2019-25058"/>
        <reference ref_id="ALSA-2023:0303" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0303.html"/>
        <description>The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.

Security Fix(es):

* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2058465" id="2058465"></bugzilla>
          <cve public="20220224" href="https://access.redhat.com/security/cve/CVE-2019-25058" impact="Moderate" cwe="CWE-863-&gt;CWE-1220" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2019-25058</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303001" comment="usbguard is earlier than 0:1.0.0-10.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303002" comment="usbguard is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303011" comment="usbguard-dbus is earlier than 0:1.0.0-10.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303004" comment="usbguard-dbus is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303012" comment="usbguard-notifier is earlier than 0:1.0.0-10.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303006" comment="usbguard-notifier is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303013" comment="usbguard-tools is earlier than 0:1.0.0-10.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303010" comment="usbguard-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303007" comment="usbguard-selinux is earlier than 0:1.0.0-10.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230303008" comment="usbguard-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230304" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:0304: libreoffice security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0304" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0304"/>
        <reference ref_id="CVE-2022-26305" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26305"/>
        <reference ref_id="CVE-2022-26306" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26306"/>
        <reference ref_id="CVE-2022-26307" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-26307"/>
        <reference ref_id="CVE-2022-3140" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3140"/>
        <reference ref_id="ALSA-2023:0304" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0304.html"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

Security Fix(es):

* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2118610" id="2118610"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2118611" id="2118611"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2118613" id="2118613"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134697" id="2134697"></bugzilla>
          <cve public="20220725" href="https://access.redhat.com/security/cve/CVE-2022-26305" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2022-26305</cve>
          <cve public="20220725" href="https://access.redhat.com/security/cve/CVE-2022-26306" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-26306</cve>
          <cve public="20220725" href="https://access.redhat.com/security/cve/CVE-2022-26307" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-26307</cve>
          <cve public="20221011" href="https://access.redhat.com/security/cve/CVE-2022-3140" impact="Moderate" cwe="CWE-88-&gt;CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2022-3140</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304357" comment="libreoffice-base is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755361" comment="libreoffice-base is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304358" comment="libreoffice-calc is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755363" comment="libreoffice-calc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304359" comment="libreoffice-core is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755365" comment="libreoffice-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304360" comment="libreoffice-draw is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755367" comment="libreoffice-draw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304361" comment="libreoffice-emailmerge is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755369" comment="libreoffice-emailmerge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304362" comment="libreoffice-filters is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755371" comment="libreoffice-filters is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304363" comment="libreoffice-gdb-debug-support is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755373" comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304364" comment="libreoffice-graphicfilter is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755375" comment="libreoffice-graphicfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304365" comment="libreoffice-gtk3 is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755377" comment="libreoffice-gtk3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304366" comment="libreoffice-help-ar is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755379" comment="libreoffice-help-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304367" comment="libreoffice-help-bg is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755381" comment="libreoffice-help-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304368" comment="libreoffice-help-bn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755383" comment="libreoffice-help-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304369" comment="libreoffice-help-ca is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755385" comment="libreoffice-help-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304370" comment="libreoffice-help-cs is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755387" comment="libreoffice-help-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304371" comment="libreoffice-help-da is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755389" comment="libreoffice-help-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304372" comment="libreoffice-help-de is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755391" comment="libreoffice-help-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304373" comment="libreoffice-help-dz is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755393" comment="libreoffice-help-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304374" comment="libreoffice-help-el is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755395" comment="libreoffice-help-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304375" comment="libreoffice-help-en is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755397" comment="libreoffice-help-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304376" comment="libreoffice-help-eo is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755399" comment="libreoffice-help-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304377" comment="libreoffice-help-es is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755401" comment="libreoffice-help-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304378" comment="libreoffice-help-et is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755403" comment="libreoffice-help-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304379" comment="libreoffice-help-eu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755405" comment="libreoffice-help-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304380" comment="libreoffice-help-fi is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755407" comment="libreoffice-help-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304381" comment="libreoffice-help-fr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755409" comment="libreoffice-help-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304382" comment="libreoffice-help-gl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755411" comment="libreoffice-help-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304383" comment="libreoffice-help-gu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755413" comment="libreoffice-help-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304384" comment="libreoffice-help-he is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755415" comment="libreoffice-help-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304385" comment="libreoffice-help-hi is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755417" comment="libreoffice-help-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304386" comment="libreoffice-help-hr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755419" comment="libreoffice-help-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304387" comment="libreoffice-help-hu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755421" comment="libreoffice-help-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304388" comment="libreoffice-help-id is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755423" comment="libreoffice-help-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304389" comment="libreoffice-help-it is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755425" comment="libreoffice-help-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304390" comment="libreoffice-help-ja is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755427" comment="libreoffice-help-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304391" comment="libreoffice-help-ko is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755429" comment="libreoffice-help-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304392" comment="libreoffice-help-lt is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755431" comment="libreoffice-help-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304393" comment="libreoffice-help-lv is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755433" comment="libreoffice-help-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304394" comment="libreoffice-help-nb is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755435" comment="libreoffice-help-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304395" comment="libreoffice-help-nl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755437" comment="libreoffice-help-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304396" comment="libreoffice-help-nn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755439" comment="libreoffice-help-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304397" comment="libreoffice-help-pl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755441" comment="libreoffice-help-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304398" comment="libreoffice-help-pt-BR is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755443" comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304399" comment="libreoffice-help-pt-PT is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755445" comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304400" comment="libreoffice-help-ro is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755447" comment="libreoffice-help-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304401" comment="libreoffice-help-ru is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755449" comment="libreoffice-help-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304402" comment="libreoffice-help-si is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755451" comment="libreoffice-help-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304403" comment="libreoffice-help-sk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755453" comment="libreoffice-help-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304404" comment="libreoffice-help-sl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755455" comment="libreoffice-help-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304405" comment="libreoffice-help-sv is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755457" comment="libreoffice-help-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304406" comment="libreoffice-help-ta is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755459" comment="libreoffice-help-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304407" comment="libreoffice-help-tr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755461" comment="libreoffice-help-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304408" comment="libreoffice-help-uk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755463" comment="libreoffice-help-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304409" comment="libreoffice-help-zh-Hans is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755465" comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304410" comment="libreoffice-help-zh-Hant is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755467" comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304411" comment="libreoffice-impress is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755469" comment="libreoffice-impress is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304412" comment="libreoffice-langpack-af is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755471" comment="libreoffice-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304413" comment="libreoffice-langpack-ar is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755473" comment="libreoffice-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304414" comment="libreoffice-langpack-as is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755475" comment="libreoffice-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304415" comment="libreoffice-langpack-bg is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755477" comment="libreoffice-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304416" comment="libreoffice-langpack-bn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755479" comment="libreoffice-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304417" comment="libreoffice-langpack-br is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755481" comment="libreoffice-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304418" comment="libreoffice-langpack-ca is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755483" comment="libreoffice-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304419" comment="libreoffice-langpack-cs is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755485" comment="libreoffice-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304420" comment="libreoffice-langpack-cy is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755487" comment="libreoffice-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304421" comment="libreoffice-langpack-da is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755489" comment="libreoffice-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304422" comment="libreoffice-langpack-de is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755491" comment="libreoffice-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304423" comment="libreoffice-langpack-dz is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755493" comment="libreoffice-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304424" comment="libreoffice-langpack-el is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755495" comment="libreoffice-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304425" comment="libreoffice-langpack-en is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755497" comment="libreoffice-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304426" comment="libreoffice-langpack-eo is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755499" comment="libreoffice-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304427" comment="libreoffice-langpack-es is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755501" comment="libreoffice-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304428" comment="libreoffice-langpack-et is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755503" comment="libreoffice-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304429" comment="libreoffice-langpack-eu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755505" comment="libreoffice-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304430" comment="libreoffice-langpack-fa is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755507" comment="libreoffice-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304431" comment="libreoffice-langpack-fi is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755509" comment="libreoffice-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304432" comment="libreoffice-langpack-fr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755511" comment="libreoffice-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304433" comment="libreoffice-langpack-fy is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755513" comment="libreoffice-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304434" comment="libreoffice-langpack-ga is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755515" comment="libreoffice-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304435" comment="libreoffice-langpack-gl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755517" comment="libreoffice-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304436" comment="libreoffice-langpack-gu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755519" comment="libreoffice-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304437" comment="libreoffice-langpack-he is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755521" comment="libreoffice-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304438" comment="libreoffice-langpack-hi is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755523" comment="libreoffice-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304439" comment="libreoffice-langpack-hr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755525" comment="libreoffice-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304440" comment="libreoffice-langpack-hu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755527" comment="libreoffice-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304441" comment="libreoffice-langpack-id is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755529" comment="libreoffice-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304442" comment="libreoffice-langpack-it is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755531" comment="libreoffice-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304443" comment="libreoffice-langpack-ja is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755533" comment="libreoffice-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304444" comment="libreoffice-langpack-kk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755535" comment="libreoffice-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304445" comment="libreoffice-langpack-kn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755537" comment="libreoffice-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304446" comment="libreoffice-langpack-ko is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755539" comment="libreoffice-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304447" comment="libreoffice-langpack-lt is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755541" comment="libreoffice-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304448" comment="libreoffice-langpack-lv is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755543" comment="libreoffice-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304449" comment="libreoffice-langpack-mai is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755545" comment="libreoffice-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304450" comment="libreoffice-langpack-ml is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755547" comment="libreoffice-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304451" comment="libreoffice-langpack-mr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755549" comment="libreoffice-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304452" comment="libreoffice-langpack-nb is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755551" comment="libreoffice-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304453" comment="libreoffice-langpack-nl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755553" comment="libreoffice-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304454" comment="libreoffice-langpack-nn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755555" comment="libreoffice-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304455" comment="libreoffice-langpack-nr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755557" comment="libreoffice-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304456" comment="libreoffice-langpack-nso is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755559" comment="libreoffice-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304457" comment="libreoffice-langpack-or is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755561" comment="libreoffice-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304458" comment="libreoffice-langpack-pa is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755563" comment="libreoffice-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304459" comment="libreoffice-langpack-pl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755565" comment="libreoffice-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304460" comment="libreoffice-langpack-pt-BR is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755567" comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304461" comment="libreoffice-langpack-pt-PT is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755569" comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304462" comment="libreoffice-langpack-ro is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755571" comment="libreoffice-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304463" comment="libreoffice-langpack-ru is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755573" comment="libreoffice-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304464" comment="libreoffice-langpack-si is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755575" comment="libreoffice-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304465" comment="libreoffice-langpack-sk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755577" comment="libreoffice-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304466" comment="libreoffice-langpack-sl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755579" comment="libreoffice-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304467" comment="libreoffice-langpack-sr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755581" comment="libreoffice-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304468" comment="libreoffice-langpack-ss is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755583" comment="libreoffice-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304469" comment="libreoffice-langpack-st is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755585" comment="libreoffice-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304470" comment="libreoffice-langpack-sv is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755587" comment="libreoffice-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304471" comment="libreoffice-langpack-ta is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755589" comment="libreoffice-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304472" comment="libreoffice-langpack-te is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755591" comment="libreoffice-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304473" comment="libreoffice-langpack-th is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755593" comment="libreoffice-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304474" comment="libreoffice-langpack-tn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755595" comment="libreoffice-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304475" comment="libreoffice-langpack-tr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755597" comment="libreoffice-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304476" comment="libreoffice-langpack-ts is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755599" comment="libreoffice-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304477" comment="libreoffice-langpack-uk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755601" comment="libreoffice-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304478" comment="libreoffice-langpack-ve is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755603" comment="libreoffice-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304479" comment="libreoffice-langpack-xh is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755605" comment="libreoffice-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304480" comment="libreoffice-langpack-zh-Hans is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755607" comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304481" comment="libreoffice-langpack-zh-Hant is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755609" comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304482" comment="libreoffice-langpack-zu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755611" comment="libreoffice-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304483" comment="libreoffice-math is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755613" comment="libreoffice-math is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304484" comment="libreoffice-ogltrans is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755615" comment="libreoffice-ogltrans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304485" comment="libreoffice-pdfimport is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755617" comment="libreoffice-pdfimport is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304486" comment="libreoffice-pyuno is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755619" comment="libreoffice-pyuno is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304487" comment="libreoffice-sdk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755621" comment="libreoffice-sdk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304488" comment="libreoffice-sdk-doc is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755623" comment="libreoffice-sdk-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304489" comment="libreoffice-ure is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755625" comment="libreoffice-ure is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304490" comment="libreoffice-wiki-publisher is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755627" comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304491" comment="libreoffice-writer is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755629" comment="libreoffice-writer is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304492" comment="libreoffice-x11 is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755631" comment="libreoffice-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304493" comment="libreoffice-xsltfilter is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755633" comment="libreoffice-xsltfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304494" comment="libreofficekit is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755635" comment="libreofficekit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304495" comment="autocorr-af is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755637" comment="autocorr-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304496" comment="autocorr-bg is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755639" comment="autocorr-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304497" comment="autocorr-ca is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755641" comment="autocorr-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304498" comment="autocorr-cs is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755643" comment="autocorr-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304499" comment="autocorr-da is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755645" comment="autocorr-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304500" comment="autocorr-de is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755647" comment="autocorr-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304501" comment="autocorr-dsb is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755649" comment="autocorr-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304502" comment="autocorr-el is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755651" comment="autocorr-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304503" comment="autocorr-en is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755653" comment="autocorr-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304504" comment="autocorr-es is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755655" comment="autocorr-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304505" comment="autocorr-fa is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755657" comment="autocorr-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304506" comment="autocorr-fi is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755659" comment="autocorr-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304507" comment="autocorr-fr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755661" comment="autocorr-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304508" comment="autocorr-ga is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755663" comment="autocorr-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304509" comment="autocorr-hr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755665" comment="autocorr-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304510" comment="autocorr-hsb is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755667" comment="autocorr-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304511" comment="autocorr-hu is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755669" comment="autocorr-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304512" comment="autocorr-is is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755671" comment="autocorr-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304513" comment="autocorr-it is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755673" comment="autocorr-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304514" comment="autocorr-ja is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755675" comment="autocorr-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304515" comment="autocorr-ko is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755677" comment="autocorr-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304516" comment="autocorr-lb is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755679" comment="autocorr-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304517" comment="autocorr-lt is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755681" comment="autocorr-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304518" comment="autocorr-mn is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755683" comment="autocorr-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304519" comment="autocorr-nl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755685" comment="autocorr-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304520" comment="autocorr-pl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755687" comment="autocorr-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304521" comment="autocorr-pt is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755689" comment="autocorr-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304522" comment="autocorr-ro is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755691" comment="autocorr-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304523" comment="autocorr-ru is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755693" comment="autocorr-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304524" comment="autocorr-sk is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755695" comment="autocorr-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304525" comment="autocorr-sl is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755697" comment="autocorr-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304526" comment="autocorr-sr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755699" comment="autocorr-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304527" comment="autocorr-sv is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755701" comment="autocorr-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304528" comment="autocorr-tr is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755703" comment="autocorr-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304529" comment="autocorr-vi is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755705" comment="autocorr-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304530" comment="autocorr-vro is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755707" comment="autocorr-vro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304531" comment="autocorr-zh is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755709" comment="autocorr-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304532" comment="libreoffice-data is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755711" comment="libreoffice-data is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304533" comment="libreoffice-opensymbol-fonts is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755713" comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230304534" comment="libreoffice-ure-common is earlier than 1:7.1.8.1-8.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755715" comment="libreoffice-ure-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230321" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:0321: nodejs and nodejs-nodemon security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:0321" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0321"/>
        <reference ref_id="CVE-2021-44906" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-44906"/>
        <reference ref_id="CVE-2022-3517" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3517"/>
        <reference ref_id="CVE-2022-35256" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-35256"/>
        <reference ref_id="CVE-2022-43548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43548"/>
        <reference ref_id="ALSA-2023:0321" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0321.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20).

Security Fix(es):

* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* nodejs: Packaged version of undici does not fit with declared version. [almalinux-9] (BZ#2151627)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2066009" id="2066009"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130518" id="2130518"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134609" id="2134609"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140911" id="2140911"></bugzilla>
          <cve public="20220310" href="https://access.redhat.com/security/cve/CVE-2021-44906" impact="Moderate" cwe="CWE-1321" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2021-44906</cve>
          <cve public="20220206" href="https://access.redhat.com/security/cve/CVE-2022-3517" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3517</cve>
          <cve public="20220923" href="https://access.redhat.com/security/cve/CVE-2022-35256" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-35256</cve>
          <cve public="20221104" href="https://access.redhat.com/security/cve/CVE-2022-43548" impact="Moderate" cwe="CWE-350" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-43548</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230321003" comment="nodejs is earlier than 1:16.18.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230321007" comment="nodejs-full-i18n is earlier than 1:16.18.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230321012" comment="nodejs-libs is earlier than 1:16.18.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230321011" comment="npm is earlier than 1:8.19.2-1.16.18.1.3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230321001" comment="nodejs-nodemon is earlier than 0:2.0.20-2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595012" comment="nodejs-nodemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230321005" comment="nodejs-docs is earlier than 1:16.18.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230328" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0328: go-toolset and golang security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:0328" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0328"/>
        <reference ref_id="CVE-2022-2879" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2879"/>
        <reference ref_id="CVE-2022-2880" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2880"/>
        <reference ref_id="CVE-2022-41715" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41715"/>
        <reference ref_id="ALSA-2023:0328" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0328.html"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Internal linking fails on ppc64le (BZ#2144547)
* crypto testcases fail on golang on s390x [almalinux-9] (BZ#2149311)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2132867" id="2132867"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2132868" id="2132868"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2132872" id="2132872"></bugzilla>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-2879" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2879</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-2880" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-2880</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-41715" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41715</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328016" comment="go-toolset is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328017" comment="golang is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328018" comment="golang-bin is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328019" comment="golang-race is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799010" comment="golang-race is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328020" comment="golang-docs is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328021" comment="golang-misc is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328022" comment="golang-src is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230328023" comment="golang-tests is earlier than 0:1.18.9-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230333" version="634" class="patch">
      <metadata>
        <title>ALSA-2023:0333: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0333" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0333"/>
        <reference ref_id="CVE-2022-32221" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32221"/>
        <reference ref_id="ALSA-2023:0333" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0333.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: POST following PUT confusion (CVE-2022-32221)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2135411" id="2135411"></bugzilla>
          <cve public="20221026" href="https://access.redhat.com/security/cve/CVE-2022-32221" impact="Moderate" cwe="CWE-440" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2022-32221</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230333001" comment="curl is earlier than 0:7.76.1-19.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230333003" comment="curl-minimal is earlier than 0:7.76.1-19.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230333010" comment="libcurl is earlier than 0:7.76.1-19.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230333011" comment="libcurl-devel is earlier than 0:7.76.1-19.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230333012" comment="libcurl-minimal is earlier than 0:7.76.1-19.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230334" version="643" class="patch">
      <metadata>
        <title>ALSA-2023:0334: kernel security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:0334" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0334"/>
        <reference ref_id="CVE-2022-2959" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2959"/>
        <reference ref_id="CVE-2022-2964" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2964"/>
        <reference ref_id="CVE-2022-30594" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30594"/>
        <reference ref_id="CVE-2022-3077" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3077"/>
        <reference ref_id="CVE-2022-4139" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4139"/>
        <reference ref_id="CVE-2022-43945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43945"/>
        <reference ref_id="ALSA-2023:0334" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0334.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Intel 9.2: Important iavf bug fixes (BZ#2127884)
* vfio zero page mappings fail after 2M instances (BZ#2128514)
* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)
* ice: Driver Update to 5.19 (BZ#2132070)
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)
* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)
* updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)
* DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)
* No signal showed in the VGA monitor when installing AlmaLinux9 in the legacy bios mode (BZ#2140153)
* Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168)
* ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976)
* fatal error: error in backend: Branch target out of insn range (BZ#2144902)
* AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217)
* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)
* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)
* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2067482" id="2067482"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2085300" id="2085300"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2103681" id="2103681"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123309" id="2123309"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2141752" id="2141752"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2147572" id="2147572"></bugzilla>
          <cve public="20220527" href="https://access.redhat.com/security/cve/CVE-2022-2959" impact="Important" cwe="CWE-667-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2959</cve>
          <cve public="20220321" href="https://access.redhat.com/security/cve/CVE-2022-2964" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-2964</cve>
          <cve public="20220512" href="https://access.redhat.com/security/cve/CVE-2022-30594" impact="Moderate" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-30594</cve>
          <cve public="20220602" href="https://access.redhat.com/security/cve/CVE-2022-3077" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3077</cve>
          <cve public="20221130" href="https://access.redhat.com/security/cve/CVE-2022-4139" impact="Important" cwe="CWE-281" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4139</cve>
          <cve public="20221003" href="https://access.redhat.com/security/cve/CVE-2022-43945" impact="Important" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-43945</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334001" comment="bpftool is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334003" comment="kernel is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334007" comment="kernel-core is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334009" comment="kernel-cross-headers is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334011" comment="kernel-debug is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334013" comment="kernel-debug-core is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334015" comment="kernel-debug-devel is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334019" comment="kernel-debug-modules is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334023" comment="kernel-devel is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334025" comment="kernel-devel-matched is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334029" comment="kernel-modules is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334031" comment="kernel-modules-extra is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334033" comment="kernel-tools is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334054" comment="kernel-tools-libs is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334055" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334056" comment="kernel-zfcpdump is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334057" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334058" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334059" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334060" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334061" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334051" comment="perf is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334053" comment="python3-perf is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230334027" comment="kernel-doc is earlier than 0:5.14.0-162.12.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230335" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:0335: dbus security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0335" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0335"/>
        <reference ref_id="CVE-2022-42010" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42010"/>
        <reference ref_id="CVE-2022-42011" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42011"/>
        <reference ref_id="CVE-2022-42012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42012"/>
        <reference ref_id="ALSA-2023:0335" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0335.html"/>
        <description>D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Security Fix(es):

* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133616" id="2133616"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133617" id="2133617"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133618" id="2133618"></bugzilla>
          <cve public="20221005" href="https://access.redhat.com/security/cve/CVE-2022-42010" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42010</cve>
          <cve public="20221005" href="https://access.redhat.com/security/cve/CVE-2022-42011" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42011</cve>
          <cve public="20221005" href="https://access.redhat.com/security/cve/CVE-2022-42012" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42012</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335001" comment="dbus is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335002" comment="dbus is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335005" comment="dbus-daemon is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335006" comment="dbus-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335015" comment="dbus-devel is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335008" comment="dbus-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335016" comment="dbus-libs is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335010" comment="dbus-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335011" comment="dbus-tools is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335012" comment="dbus-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335013" comment="dbus-x11 is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335014" comment="dbus-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335003" comment="dbus-common is earlier than 1:1.12.20-7.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335004" comment="dbus-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230336" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0336: systemd security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0336" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0336"/>
        <reference ref_id="CVE-2022-3821" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3821"/>
        <reference ref_id="ALSA-2023:0336" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0336.html"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: buffer overrun in format_timespan() function (CVE-2022-3821)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2139327" id="2139327"></bugzilla>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2022-3821" impact="Moderate" cwe="CWE-193" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3821</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336001" comment="systemd is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336002" comment="systemd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336003" comment="systemd-container is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336004" comment="systemd-container is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336005" comment="systemd-devel is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336006" comment="systemd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336021" comment="systemd-journal-remote is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336008" comment="systemd-journal-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336009" comment="systemd-libs is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336010" comment="systemd-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336022" comment="systemd-oomd is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336012" comment="systemd-oomd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336023" comment="systemd-pam is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336014" comment="systemd-pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336024" comment="systemd-resolved is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336016" comment="systemd-resolved is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336025" comment="systemd-udev is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336020" comment="systemd-udev is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336017" comment="systemd-rpm-macros is earlier than 0:250-12.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336018" comment="systemd-rpm-macros is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230337" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0337: expat security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0337" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0337"/>
        <reference ref_id="CVE-2022-43680" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43680"/>
        <reference ref_id="ALSA-2023:0337" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0337.html"/>
        <description>Expat is a C library for parsing XML documents.

Security Fix(es):

* expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2140059" id="2140059"></bugzilla>
          <cve public="20221024" href="https://access.redhat.com/security/cve/CVE-2022-43680" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-43680</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230337001" comment="expat is earlier than 0:2.4.9-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244002" comment="expat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230337003" comment="expat-devel is earlier than 0:2.4.9-1.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244004" comment="expat-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230338" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0338: libxml2 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0338" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0338"/>
        <reference ref_id="CVE-2022-40303" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-40303"/>
        <reference ref_id="CVE-2022-40304" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-40304"/>
        <reference ref_id="ALSA-2023:0338" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0338.html"/>
        <description>The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2136266" id="2136266"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2136288" id="2136288"></bugzilla>
          <cve public="20221014" href="https://access.redhat.com/security/cve/CVE-2022-40303" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H">CVE-2022-40303</cve>
          <cve public="20221014" href="https://access.redhat.com/security/cve/CVE-2022-40304" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H">CVE-2022-40304</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230338001" comment="libxml2 is earlier than 0:2.9.13-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250002" comment="libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230338003" comment="libxml2-devel is earlier than 0:2.9.13-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250004" comment="libxml2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230338006" comment="python3-libxml2 is earlier than 0:2.9.13-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250006" comment="python3-libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230339" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0339: sqlite security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0339" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0339"/>
        <reference ref_id="CVE-2022-35737" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-35737"/>
        <reference ref_id="ALSA-2023:0339" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0339.html"/>
        <description>SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

Security Fix(es):

* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2110291" id="2110291"></bugzilla>
          <cve public="20220722" href="https://access.redhat.com/security/cve/CVE-2022-35737" impact="Moderate" cwe="CWE-129" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-35737</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339001" comment="sqlite is earlier than 0:3.34.1-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339002" comment="sqlite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339003" comment="sqlite-devel is earlier than 0:3.34.1-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339004" comment="sqlite-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339005" comment="sqlite-libs is earlier than 0:3.34.1-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339006" comment="sqlite-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230343" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0343: libtasn1 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0343" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0343"/>
        <reference ref_id="CVE-2021-46848" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46848"/>
        <reference ref_id="ALSA-2023:0343" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0343.html"/>
        <description>A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.

Security Fix(es):

* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2140058" id="2140058"></bugzilla>
          <cve public="20221024" href="https://access.redhat.com/security/cve/CVE-2021-46848" impact="Moderate" cwe="CWE-193-&gt;CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-46848</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230343001" comment="libtasn1 is earlier than 0:4.16.0-8.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230343002" comment="libtasn1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230343003" comment="libtasn1-devel is earlier than 0:4.16.0-8.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230343004" comment="libtasn1-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230343007" comment="libtasn1-tools is earlier than 0:4.16.0-8.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230343006" comment="libtasn1-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230383" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0383: libXpm security update (Important)</title>
        <reference ref_id="RHSA-2023:0383" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0383"/>
        <reference ref_id="CVE-2022-44617" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-44617"/>
        <reference ref_id="CVE-2022-46285" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46285"/>
        <reference ref_id="CVE-2022-4883" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4883"/>
        <reference ref_id="ALSA-2023:0383" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0383.html"/>
        <description>X.Org X11 libXpm runtime library.

Security Fix(es):

* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-01-23"/>
          <updated date="2023-01-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2160092" id="2160092"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2160193" id="2160193"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2160213" id="2160213"></bugzilla>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-44617" impact="Moderate" cwe="CWE-20-&gt;CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-44617</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-46285" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-46285</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-4883" impact="Important" cwe="CWE-426" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4883</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230383001" comment="libXpm is earlier than 0:3.5.13-8.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230383002" comment="libXpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230383003" comment="libXpm-devel is earlier than 0:3.5.13-8.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230383004" comment="libXpm-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230611" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0611: git security update (Important)</title>
        <reference ref_id="RHSA-2023:0611" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0611"/>
        <reference ref_id="CVE-2022-23521" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-23521"/>
        <reference ref_id="CVE-2022-41903" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41903"/>
        <reference ref_id="ALSA-2023:0611" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0611.html"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-06"/>
          <updated date="2023-02-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2162055" id="2162055"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162056" id="2162056"></bugzilla>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-23521" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-23521</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-41903" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-41903</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611001" comment="git is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611002" comment="git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611005" comment="git-core is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611006" comment="git-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611009" comment="git-credential-libsecret is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611010" comment="git-credential-libsecret is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611011" comment="git-daemon is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611012" comment="git-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611019" comment="git-subtree is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611020" comment="git-subtree is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611003" comment="git-all is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611004" comment="git-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611007" comment="git-core-doc is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611008" comment="git-core-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611013" comment="git-email is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611014" comment="git-email is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611015" comment="git-gui is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611016" comment="git-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611017" comment="git-instaweb is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611018" comment="git-instaweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611021" comment="git-svn is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611022" comment="git-svn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611023" comment="gitk is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611024" comment="gitk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611025" comment="gitweb is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611026" comment="gitweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611027" comment="perl-Git is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611028" comment="perl-Git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611029" comment="perl-Git-SVN is earlier than 0:2.31.1-3.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611030" comment="perl-Git-SVN is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230622" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:0622: tigervnc security update (Important)</title>
        <reference ref_id="RHSA-2023:0622" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0622"/>
        <reference ref_id="CVE-2023-0494" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0494"/>
        <reference ref_id="ALSA-2023:0622" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0622.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-07"/>
          <updated date="2023-02-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2165995" id="2165995"></bugzilla>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0494" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0494</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622001" comment="tigervnc is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622009" comment="tigervnc-server is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622011" comment="tigervnc-server-minimal is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622013" comment="tigervnc-server-module is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622003" comment="tigervnc-icons is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622005" comment="tigervnc-license is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622007" comment="tigervnc-selinux is earlier than 0:1.12.0-5.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230752" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0752: grub2 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0752" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0752"/>
        <reference ref_id="CVE-2022-2601" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2601"/>
        <reference ref_id="CVE-2022-3775" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3775"/>
        <reference ref_id="ALSA-2023:0752" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0752.html"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

Security Fix(es):

* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
* grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-14"/>
          <updated date="2023-02-14"/>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2112975" id="2112975"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2138880" id="2138880"></bugzilla>
          <cve public="20221115" href="https://access.redhat.com/security/cve/CVE-2022-2601" impact="Moderate" cwe="CWE-122-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2022-2601</cve>
          <cve public="20221115" href="https://access.redhat.com/security/cve/CVE-2022-3775" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H">CVE-2022-3775</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752030" comment="grub2-efi-aa64 is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099004" comment="grub2-efi-aa64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752031" comment="grub2-efi-aa64-cdboot is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099006" comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752032" comment="grub2-efi-x64 is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099010" comment="grub2-efi-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752033" comment="grub2-efi-x64-cdboot is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099012" comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752034" comment="grub2-pc is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099016" comment="grub2-pc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752035" comment="grub2-ppc64le is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099020" comment="grub2-ppc64le is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752036" comment="grub2-tools is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099024" comment="grub2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752037" comment="grub2-tools-efi is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099026" comment="grub2-tools-efi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752038" comment="grub2-tools-extra is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099028" comment="grub2-tools-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752039" comment="grub2-tools-minimal is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099030" comment="grub2-tools-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752040" comment="grub2-common is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099002" comment="grub2-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752041" comment="grub2-efi-aa64-modules is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099008" comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752042" comment="grub2-efi-x64-modules is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099014" comment="grub2-efi-x64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752043" comment="grub2-pc-modules is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099018" comment="grub2-pc-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230752044" comment="grub2-ppc64le-modules is earlier than 1:2.06-46.el9_1.3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099022" comment="grub2-ppc64le-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230810" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0810: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:0810" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0810"/>
        <reference ref_id="CVE-2023-0767" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0767"/>
        <reference ref_id="CVE-2023-25728" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25728"/>
        <reference ref_id="CVE-2023-25729" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25729"/>
        <reference ref_id="CVE-2023-25730" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25730"/>
        <reference ref_id="CVE-2023-25732" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25732"/>
        <reference ref_id="CVE-2023-25735" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25735"/>
        <reference ref_id="CVE-2023-25737" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25737"/>
        <reference ref_id="CVE-2023-25739" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25739"/>
        <reference ref_id="CVE-2023-25742" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25742"/>
        <reference ref_id="CVE-2023-25743" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25743"/>
        <reference ref_id="CVE-2023-25744" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25744"/>
        <reference ref_id="CVE-2023-25746" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25746"/>
        <reference ref_id="ALSA-2023:0810" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0810.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.8.0 ESR.

Security Fix(es):

* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-20"/>
          <updated date="2023-02-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2170374" id="2170374"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170375" id="2170375"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170376" id="2170376"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170377" id="2170377"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170378" id="2170378"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170379" id="2170379"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170381" id="2170381"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170382" id="2170382"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170383" id="2170383"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170390" id="2170390"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170391" id="2170391"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170402" id="2170402"></bugzilla>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-0767" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-0767</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25728" impact="Important" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25728</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25729" impact="Moderate" cwe="CWE-84" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-25729</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25730" impact="Important" cwe="CWE-821" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25730</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25732" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-25732</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25735" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25735</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25737" impact="Important" cwe="CWE-704" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25737</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25739" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25739</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25742" impact="Low" cwe="CWE-173" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2023-25742</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25743" impact="Important" cwe="CWE-357" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25743</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25744" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25744</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-25746" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25746</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810005" comment="firefox is earlier than 0:102.8.0-2.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810006" comment="firefox-x11 is earlier than 0:102.8.0-2.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230903" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:0903: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:0903" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0903"/>
        <reference ref_id="CVE-2023-23529" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23529"/>
        <reference ref_id="ALSA-2023:0903" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0903.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-22"/>
          <updated date="2023-02-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2169934" id="2169934"></bugzilla>
          <cve public="20230213" href="https://access.redhat.com/security/cve/CVE-2023-23529" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-23529</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230903001" comment="webkit2gtk3 is earlier than 0:2.36.7-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230903003" comment="webkit2gtk3-devel is earlier than 0:2.36.7-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230903005" comment="webkit2gtk3-jsc is earlier than 0:2.36.7-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230903007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.36.7-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230946" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0946: openssl security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:0946" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0946"/>
        <reference ref_id="CVE-2022-4203" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4203"/>
        <reference ref_id="CVE-2022-4304" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4304"/>
        <reference ref_id="CVE-2022-4450" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4450"/>
        <reference ref_id="CVE-2023-0215" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0215"/>
        <reference ref_id="CVE-2023-0216" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0216"/>
        <reference ref_id="CVE-2023-0217" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0217"/>
        <reference ref_id="CVE-2023-0286" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0286"/>
        <reference ref_id="CVE-2023-0401" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0401"/>
        <reference ref_id="ALSA-2023:0946" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0946.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
* openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216)
* openssl: NULL dereference validating DSA public key (CVE-2023-0217)
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* HMAC generation should reject key lengths &lt; 112 bits or provide an indicator in FIPS mode (BZ#2144000)
* In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003)
* stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008)
* In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010)
* In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012)
* In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015)
* In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017)
* In FIPS mode, openssl should reject KDF input and output key lengths &lt; 112 bits or provide an indicator (BZ#2144019)
* In FIPS mode, openssl should reject RSA keys &lt; 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170)
* AlmaLinux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010)
* OpenSSL FIPS checksum code needs update (BZ#2158412)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2164440" id="2164440"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164487" id="2164487"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164488" id="2164488"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164492" id="2164492"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164494" id="2164494"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164497" id="2164497"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164499" id="2164499"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164500" id="2164500"></bugzilla>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2022-4203" impact="Moderate" cwe="(CWE-119|CWE-125)" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4203</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2022-4304" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-4304</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2022-4450" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4450</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0215" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0215</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0216" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0216</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0217" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0217</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0286" impact="Moderate" cwe="CWE-704" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H">CVE-2023-0286</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0401" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0401</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230946001" comment="openssl is earlier than 1:3.0.1-47.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230946008" comment="openssl-devel is earlier than 1:3.0.1-47.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230946009" comment="openssl-libs is earlier than 1:3.0.1-47.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230946007" comment="openssl-perl is earlier than 1:3.0.1-47.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230951" version="643" class="patch">
      <metadata>
        <title>ALSA-2023:0951: kernel security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:0951" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0951"/>
        <reference ref_id="CVE-2022-2873" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2873"/>
        <reference ref_id="CVE-2022-3564" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3564"/>
        <reference ref_id="CVE-2022-4378" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4378"/>
        <reference ref_id="CVE-2022-4379" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4379"/>
        <reference ref_id="CVE-2023-0179" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0179"/>
        <reference ref_id="ALSA-2023:0951" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0951.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)
* kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* AlmaLinux 9.0: LTP Test failure and crash at fork14 on Sapphire Rapids Platinum 8280+ (BZ#2133083)
* AlmaLinux 9.1 Extending NMI watchdog's timer during LPM (BZ#2140085)
* AMDSERVER 9.1: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151274)
* qla2xxx NVMe-FC:  WARNING: CPU: 0 PID: 124072 at drivers/scsi/qla2xxx/qla_init.c:70 qla2xxx_rel_done_warning+0x25/0x30 [qla2xxx] (BZ#2152178)
* Regression: Kernel panic on Lenovo T480 with AH40 USB-C docking station (BZ#2153277)
* Scheduler Update (almalinux9.2) (BZ#2153792)
* AlmaLinux9.1, Nx_Gzip: nr_total_credits is not decremented when processing units are reduced by dlpar in shared mode. (FW1030 / DLPAR) (BZ#2154305)
* MSFT, MANA, NET Patch AlmaLinux-9: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155145)
* Azure vPCI AlmaLinux-9 add the support of multi-MSI (BZ#2155459)
* Azure AlmaLinux-9: VM Deployment Failures Patch Request (BZ#2155930)
* The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158815)
* AlmaLinux-9.2: Update NVMe driver to sync with upstream v6.0 (BZ#2161344)
* CEE cephfs: AlmaLinux9 cephfs client crashing with RIP: 0010:netfs_rreq_unlock+0xef/0x380 [netfs] (BZ#2161418)
* block layer: update with upstream v6.0 (BZ#2162535)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2119048" id="2119048"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150999" id="2150999"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2152548" id="2152548"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2152807" id="2152807"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161713" id="2161713"></bugzilla>
          <cve public="20220729" href="https://access.redhat.com/security/cve/CVE-2022-2873" impact="Moderate" cwe="CWE-131" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2873</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-3564" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3564</cve>
          <cve public="20221209" href="https://access.redhat.com/security/cve/CVE-2022-4378" impact="Important" cwe="CWE-120-&gt;CWE-131-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4378</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-4379" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4379</cve>
          <cve public="20230113" href="https://access.redhat.com/security/cve/CVE-2023-0179" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0179</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951001" comment="bpftool is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951003" comment="kernel is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951007" comment="kernel-core is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951009" comment="kernel-cross-headers is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951011" comment="kernel-debug is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951013" comment="kernel-debug-core is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951015" comment="kernel-debug-devel is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951019" comment="kernel-debug-modules is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951023" comment="kernel-devel is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951025" comment="kernel-devel-matched is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951029" comment="kernel-modules is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951031" comment="kernel-modules-extra is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951033" comment="kernel-tools is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951054" comment="kernel-tools-libs is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951055" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951056" comment="kernel-zfcpdump is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951057" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951058" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951059" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951060" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951061" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951051" comment="perf is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951053" comment="python3-perf is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230951027" comment="kernel-doc is earlier than 0:5.14.0-162.18.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230952" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0952: python-setuptools security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0952" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0952"/>
        <reference ref_id="CVE-2022-40897" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-40897"/>
        <reference ref_id="ALSA-2023:0952" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0952.html"/>
        <description>The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.

Security Fix(es):

* pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2158559" id="2158559"></bugzilla>
          <cve public="20221222" href="https://access.redhat.com/security/cve/CVE-2022-40897" impact="Moderate" cwe="CWE-185" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-40897</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230952001" comment="python3-setuptools is earlier than 0:53.0.0-10.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230952002" comment="python3-setuptools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230952003" comment="python3-setuptools-wheel is earlier than 0:53.0.0-10.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230952004" comment="python3-setuptools-wheel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230953" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0953: python3.9 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0953" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0953"/>
        <reference ref_id="CVE-2022-45061" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45061"/>
        <reference ref_id="ALSA-2023:0953" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0953.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2144072" id="2144072"></bugzilla>
          <cve public="20221109" href="https://access.redhat.com/security/cve/CVE-2022-45061" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-45061</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953003" comment="python3 is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953005" comment="python3-debug is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953007" comment="python3-devel is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953009" comment="python3-idle is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953011" comment="python3-libs is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953013" comment="python3-test is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953015" comment="python3-tkinter is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230953001" comment="python-unversioned-command is earlier than 0:3.9.14-1.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230954" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0954: systemd security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0954" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0954"/>
        <reference ref_id="CVE-2022-4415" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4415"/>
        <reference ref_id="CVE-2022-45873" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45873"/>
        <reference ref_id="ALSA-2023:0954" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0954.html"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)
* systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2149063" id="2149063"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2155515" id="2155515"></bugzilla>
          <cve public="20221221" href="https://access.redhat.com/security/cve/CVE-2022-4415" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-4415</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-45873" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-45873</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954001" comment="systemd is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336002" comment="systemd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954003" comment="systemd-container is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336004" comment="systemd-container is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954005" comment="systemd-devel is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336006" comment="systemd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954020" comment="systemd-journal-remote is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336008" comment="systemd-journal-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954009" comment="systemd-libs is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336010" comment="systemd-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954021" comment="systemd-oomd is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336012" comment="systemd-oomd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954022" comment="systemd-pam is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336014" comment="systemd-pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954023" comment="systemd-resolved is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336016" comment="systemd-resolved is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954024" comment="systemd-udev is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336020" comment="systemd-udev is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230954017" comment="systemd-rpm-macros is earlier than 0:250-12.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336018" comment="systemd-rpm-macros is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230958" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0958: vim security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0958" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0958"/>
        <reference ref_id="CVE-2022-47024" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-47024"/>
        <reference ref_id="ALSA-2023:0958" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0958.html"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.

Security Fix(es):

* vim: no check if the return value of XChangeGC() is NULL (CVE-2022-47024)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2163613" id="2163613"></bugzilla>
          <cve public="20230120" href="https://access.redhat.com/security/cve/CVE-2022-47024" impact="Moderate" cwe="CWE-252-&gt;CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-47024</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230958001" comment="vim-X11 is earlier than 2:8.2.2637-20.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242002" comment="vim-X11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230958003" comment="vim-common is earlier than 2:8.2.2637-20.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242004" comment="vim-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230958005" comment="vim-enhanced is earlier than 2:8.2.2637-20.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242006" comment="vim-enhanced is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230958009" comment="vim-minimal is earlier than 2:8.2.2637-20.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242010" comment="vim-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230958007" comment="vim-filesystem is earlier than 2:8.2.2637-20.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242008" comment="vim-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230965" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0965: php security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0965" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0965"/>
        <reference ref_id="CVE-2022-31628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31628"/>
        <reference ref_id="CVE-2022-31629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31629"/>
        <reference ref_id="CVE-2022-31630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31630"/>
        <reference ref_id="CVE-2022-31631" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31631"/>
        <reference ref_id="CVE-2022-37454" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-37454"/>
        <reference ref_id="ALSA-2023:0965" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0965.html"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667)

Security Fix(es):

* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
* php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629)
* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
* php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)
* php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133687" id="2133687"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133688" id="2133688"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2139280" id="2139280"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140200" id="2140200"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2158791" id="2158791"></bugzilla>
          <cve public="20220929" href="https://access.redhat.com/security/cve/CVE-2022-31628" impact="Low" cwe="CWE-674" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-31628</cve>
          <cve public="20220929" href="https://access.redhat.com/security/cve/CVE-2022-31629" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2022-31629</cve>
          <cve public="20221027" href="https://access.redhat.com/security/cve/CVE-2022-31630" impact="Moderate" cwe="CWE-20-&gt;CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L">CVE-2022-31630</cve>
          <cve public="20230105" href="https://access.redhat.com/security/cve/CVE-2022-31631" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-31631</cve>
          <cve public="20221020" href="https://access.redhat.com/security/cve/CVE-2022-37454" impact="Important" cwe="CWE-680" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-37454</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965001" comment="php is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904002" comment="php is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965003" comment="php-bcmath is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904004" comment="php-bcmath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965005" comment="php-cli is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904006" comment="php-cli is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965007" comment="php-common is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904008" comment="php-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965009" comment="php-dba is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904010" comment="php-dba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965011" comment="php-dbg is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904012" comment="php-dbg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965013" comment="php-devel is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904014" comment="php-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965015" comment="php-embedded is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904016" comment="php-embedded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965017" comment="php-enchant is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904018" comment="php-enchant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965019" comment="php-ffi is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904020" comment="php-ffi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965021" comment="php-fpm is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904022" comment="php-fpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965023" comment="php-gd is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904024" comment="php-gd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965025" comment="php-gmp is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904026" comment="php-gmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965027" comment="php-intl is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904028" comment="php-intl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965029" comment="php-ldap is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904030" comment="php-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965031" comment="php-mbstring is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904032" comment="php-mbstring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965033" comment="php-mysqlnd is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904034" comment="php-mysqlnd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965035" comment="php-odbc is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904036" comment="php-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965037" comment="php-opcache is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904038" comment="php-opcache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965039" comment="php-pdo is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904040" comment="php-pdo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965041" comment="php-pgsql is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904042" comment="php-pgsql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965043" comment="php-process is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904044" comment="php-process is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965045" comment="php-snmp is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904046" comment="php-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965047" comment="php-soap is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904048" comment="php-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230965049" comment="php-xml is earlier than 0:8.0.27-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904050" comment="php-xml is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230970" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0970: httpd security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:0970" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0970"/>
        <reference ref_id="CVE-2006-20001" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2006-20001"/>
        <reference ref_id="CVE-2022-36760" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36760"/>
        <reference ref_id="CVE-2022-37436" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-37436"/>
        <reference ref_id="ALSA-2023:0970" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0970.html"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760)
* httpd: mod_proxy: HTTP response splitting (CVE-2022-37436)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2161773" id="2161773"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161774" id="2161774"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161777" id="2161777"></bugzilla>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2006-20001" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2006-20001</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-36760" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L">CVE-2022-36760</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2022-37436" impact="Moderate" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2022-37436</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970001" comment="httpd is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726022" comment="httpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970003" comment="httpd-core is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726023" comment="httpd-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970005" comment="httpd-devel is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726024" comment="httpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970011" comment="httpd-tools is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726025" comment="httpd-tools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970013" comment="mod_ldap is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726026" comment="mod_ldap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970015" comment="mod_lua is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726027" comment="mod_lua is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970017" comment="mod_proxy_html is earlier than 1:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726028" comment="mod_proxy_html is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970019" comment="mod_session is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726029" comment="mod_session is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970021" comment="mod_ssl is earlier than 1:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726030" comment="mod_ssl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970007" comment="httpd-filesystem is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726031" comment="httpd-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230970009" comment="httpd-manual is earlier than 0:2.4.53-7.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726032" comment="httpd-manual is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230974" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:0974: pcs security update (Moderate)</title>
        <reference ref_id="RHSA-2023:0974" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0974"/>
        <reference ref_id="CVE-2022-45442" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45442"/>
        <reference ref_id="ALSA-2023:0974" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0974.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* sinatra: Reflected File Download attack (CVE-2022-45442)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2153363" id="2153363"></bugzilla>
          <cve public="20221128" href="https://access.redhat.com/security/cve/CVE-2022-45442" impact="Moderate" cwe="CWE-494" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-45442</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230974001" comment="pcs is earlier than 0:0.11.3-4.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230974003" comment="pcs-snmp is earlier than 0:0.11.3-4.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20230979" version="639" class="patch">
      <metadata>
        <title>ALSA-2023:0979: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:0979" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:0979"/>
        <reference ref_id="CVE-2022-2873" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2873"/>
        <reference ref_id="CVE-2022-3564" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3564"/>
        <reference ref_id="CVE-2022-4378" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4378"/>
        <reference ref_id="CVE-2022-4379" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4379"/>
        <reference ref_id="CVE-2023-0179" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0179"/>
        <reference ref_id="ALSA-2023:0979" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-0979.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)
* kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the latest AlmaLinux-9.1.z2 Batch (BZ#2160463)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-02-28"/>
          <updated date="2023-02-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2119048" id="2119048"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150999" id="2150999"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2152548" id="2152548"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2152807" id="2152807"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161713" id="2161713"></bugzilla>
          <cve public="20220729" href="https://access.redhat.com/security/cve/CVE-2022-2873" impact="Moderate" cwe="CWE-131" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2873</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-3564" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3564</cve>
          <cve public="20221209" href="https://access.redhat.com/security/cve/CVE-2022-4378" impact="Important" cwe="CWE-120-&gt;CWE-131-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4378</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-4379" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4379</cve>
          <cve public="20230113" href="https://access.redhat.com/security/cve/CVE-2023-0179" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0179</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979024" comment="kernel-rt is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979025" comment="kernel-rt-core is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979026" comment="kernel-rt-debug is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979032" comment="kernel-rt-devel is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979033" comment="kernel-rt-kvm is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979034" comment="kernel-rt-modules is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230979035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-162.18.1.rt21.181.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231068" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:1068: libjpeg-turbo security update (Moderate)</title>
        <reference ref_id="RHSA-2023:1068" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1068"/>
        <reference ref_id="CVE-2021-46822" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46822"/>
        <reference ref_id="ALSA-2023:1068" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1068.html"/>
        <description>The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.

Security Fix(es):

* libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c (CVE-2021-46822)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-03-06"/>
          <updated date="2023-03-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2100044" id="2100044"></bugzilla>
          <cve public="20210407" href="https://access.redhat.com/security/cve/CVE-2021-46822" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2021-46822</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068001" comment="libjpeg-turbo is earlier than 0:2.0.90-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068002" comment="libjpeg-turbo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068003" comment="libjpeg-turbo-devel is earlier than 0:2.0.90-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068004" comment="libjpeg-turbo-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068011" comment="libjpeg-turbo-utils is earlier than 0:2.0.90-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068006" comment="libjpeg-turbo-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068007" comment="turbojpeg is earlier than 0:2.0.90-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068008" comment="turbojpeg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068009" comment="turbojpeg-devel is earlier than 0:2.0.90-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068010" comment="turbojpeg-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231141" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1141: gnutls security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:1141" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1141"/>
        <reference ref_id="CVE-2023-0361" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0361"/>
        <reference ref_id="ALSA-2023:1141" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1141.html"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* CCM tag length should be limited to known values (BZ#2144535)
* In FIPS mode, gnutls should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144537)
* dracut-cmdline[554]: Error in GnuTLS initialization: Error while performing self checks i FIPS mode (BZ#2149640)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-03-07"/>
          <updated date="2023-03-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2162596" id="2162596"></bugzilla>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-0361" impact="Moderate" cwe="CWE-1300" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-0361</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231141001" comment="gnutls is earlier than 0:3.7.6-18.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854002" comment="gnutls is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231141003" comment="gnutls-c++ is earlier than 0:3.7.6-18.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854004" comment="gnutls-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231141005" comment="gnutls-dane is earlier than 0:3.7.6-18.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854006" comment="gnutls-dane is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231141007" comment="gnutls-devel is earlier than 0:3.7.6-18.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854008" comment="gnutls-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231141010" comment="gnutls-utils is earlier than 0:3.7.6-18.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854010" comment="gnutls-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231337" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1337: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:1337" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1337"/>
        <reference ref_id="CVE-2023-25751" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25751"/>
        <reference ref_id="CVE-2023-25752" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25752"/>
        <reference ref_id="CVE-2023-28162" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28162"/>
        <reference ref_id="CVE-2023-28164" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28164"/>
        <reference ref_id="CVE-2023-28176" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28176"/>
        <reference ref_id="ALSA-2023:1337" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1337.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.9.0 ESR.

Security Fix(es):

* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-03-20"/>
          <updated date="2023-03-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2178458" id="2178458"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178460" id="2178460"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178466" id="2178466"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178470" id="2178470"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178472" id="2178472"></bugzilla>
          <cve public="20230314" href="https://access.redhat.com/security/cve/CVE-2023-25751" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25751</cve>
          <cve public="20230314" href="https://access.redhat.com/security/cve/CVE-2023-25752" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-25752</cve>
          <cve public="20230314" href="https://access.redhat.com/security/cve/CVE-2023-28162" impact="Moderate" cwe="CWE-704" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-28162</cve>
          <cve public="20230314" href="https://access.redhat.com/security/cve/CVE-2023-28164" impact="Moderate" cwe="CWE-829" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-28164</cve>
          <cve public="20230314" href="https://access.redhat.com/security/cve/CVE-2023-28176" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-28176</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231337004" comment="firefox is earlier than 0:102.9.0-3.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231337005" comment="firefox-x11 is earlier than 0:102.9.0-3.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231368" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:1368: nss security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:1368" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1368"/>
        <reference ref_id="CVE-2023-0767" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0767"/>
        <reference ref_id="ALSA-2023:1368" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1368.html"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Security Fix(es):

* nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767)

Bug Fix(es):

* In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434)
* Need to update FIPS review comments into NSS AlmaLinux-9. (BZ#2177875)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-03-21"/>
          <updated date="2023-03-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2170377" id="2170377"></bugzilla>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-0767" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-0767</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368001" comment="nspr is earlier than 0:4.34.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368002" comment="nspr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368003" comment="nspr-devel is earlier than 0:4.34.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368004" comment="nspr-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368005" comment="nss is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368006" comment="nss is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368007" comment="nss-devel is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368008" comment="nss-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368009" comment="nss-softokn is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368010" comment="nss-softokn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368011" comment="nss-softokn-devel is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368012" comment="nss-softokn-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368013" comment="nss-softokn-freebl is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368014" comment="nss-softokn-freebl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368015" comment="nss-softokn-freebl-devel is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368016" comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368025" comment="nss-sysinit is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368018" comment="nss-sysinit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368026" comment="nss-tools is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368020" comment="nss-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368021" comment="nss-util is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368022" comment="nss-util is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368023" comment="nss-util-devel is earlier than 0:3.79.0-17.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368024" comment="nss-util-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231469" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:1469: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:1469" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1469"/>
        <reference ref_id="CVE-2022-4269" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4269"/>
        <reference ref_id="CVE-2022-4744" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4744"/>
        <reference ref_id="CVE-2023-0266" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0266"/>
        <reference ref_id="ALSA-2023:1469" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1469.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the latest AlmaLinux-9.1.z3 Batch (BZ#2170460)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-03-27"/>
          <updated date="2023-03-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2150272" id="2150272"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156322" id="2156322"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2163379" id="2163379"></bugzilla>
          <cve public="20220923" href="https://access.redhat.com/security/cve/CVE-2022-4269" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4269</cve>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2022-4744" impact="Important" cwe="CWE-460-&gt;CWE-824" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4744</cve>
          <cve public="20230113" href="https://access.redhat.com/security/cve/CVE-2023-0266" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0266</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469024" comment="kernel-rt is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469025" comment="kernel-rt-core is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469026" comment="kernel-rt-debug is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469032" comment="kernel-rt-devel is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469033" comment="kernel-rt-kvm is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469034" comment="kernel-rt-modules is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231469035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-162.22.2.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231470" version="640" class="patch">
      <metadata>
        <title>ALSA-2023:1470: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:1470" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1470"/>
        <reference ref_id="CVE-2022-4269" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4269"/>
        <reference ref_id="CVE-2022-4744" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4744"/>
        <reference ref_id="CVE-2023-0266" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0266"/>
        <reference ref_id="ALSA-2023:1470" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1470.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* AlmaLinux9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127880)
* Cgroups_v2, when creating new cgroup/container, resets the cpu affinity masks for all usr processes on the system. (BZ#2143766)
* AlmaLinux9.0 - boot: Add secure boot trailer (BZ#2151528)
* kernel-rt-debug: WARNING: possible circular locking dependency detected (&amp;n-&gt;list_lock-&gt;&amp;p-&gt;pi_lock-&gt;&amp;lock-&gt;wait_lock) (BZ#2160614)
* Support cpuset.sched_load_balance by changing default CPUset directory structure (BZ#2161105)
* AlmaLinux9.0 -  s390/kexec: fix ipl report address for kdump (BZ#2166903)
* libgpiod doesn't seem to work with Interphase gpiochip (BZ#2166956)
* Azure AlmaLinux9 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170227)

Enhancement(s):

* IBM 9.2 FEAT: Upgrade the QETH driver to latest from upstream, e.g. kernel 6.0 (BZ#2166304)
* Intel 9.2 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168382)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-03-27"/>
          <updated date="2023-03-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2150272" id="2150272"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156322" id="2156322"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2163379" id="2163379"></bugzilla>
          <cve public="20220923" href="https://access.redhat.com/security/cve/CVE-2022-4269" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4269</cve>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2022-4744" impact="Important" cwe="CWE-460-&gt;CWE-824" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4744</cve>
          <cve public="20230113" href="https://access.redhat.com/security/cve/CVE-2023-0266" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0266</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470001" comment="bpftool is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470003" comment="kernel is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470007" comment="kernel-core is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470009" comment="kernel-cross-headers is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470011" comment="kernel-debug is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470013" comment="kernel-debug-core is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470015" comment="kernel-debug-devel is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470019" comment="kernel-debug-modules is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470023" comment="kernel-devel is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470025" comment="kernel-devel-matched is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470029" comment="kernel-modules is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470031" comment="kernel-modules-extra is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470033" comment="kernel-tools is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470054" comment="kernel-tools-libs is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470055" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470056" comment="kernel-zfcpdump is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470057" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470058" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470059" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470060" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470061" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470051" comment="perf is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470053" comment="python3-perf is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231470027" comment="kernel-doc is earlier than 0:5.14.0-162.22.2.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231591" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1591: pcs security update (Important)</title>
        <reference ref_id="RHSA-2023:1591" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1591"/>
        <reference ref_id="CVE-2023-28154" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28154"/>
        <reference ref_id="ALSA-2023:1591" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1591.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* webpack: avoid cross-realm objects (CVE-2023-28154)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-04"/>
          <updated date="2023-04-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179227" id="2179227"></bugzilla>
          <cve public="20230313" href="https://access.redhat.com/security/cve/CVE-2023-28154" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-28154</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231591001" comment="pcs is earlier than 0:0.11.3-4.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231591003" comment="pcs-snmp is earlier than 0:0.11.3-4.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231592" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:1592: tigervnc security update (Important)</title>
        <reference ref_id="RHSA-2023:1592" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1592"/>
        <reference ref_id="CVE-2023-1393" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1393"/>
        <reference ref_id="ALSA-2023:1592" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1592.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-04"/>
          <updated date="2023-04-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2180288" id="2180288"></bugzilla>
          <cve public="20230329" href="https://access.redhat.com/security/cve/CVE-2023-1393" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-1393</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592001" comment="tigervnc is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592009" comment="tigervnc-server is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592011" comment="tigervnc-server-minimal is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592013" comment="tigervnc-server-module is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592003" comment="tigervnc-icons is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592005" comment="tigervnc-license is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231592007" comment="tigervnc-selinux is earlier than 0:1.12.0-5.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231670" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1670: httpd and mod_http2 security update (Important)</title>
        <reference ref_id="RHSA-2023:1670" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1670"/>
        <reference ref_id="CVE-2023-25690" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25690"/>
        <reference ref_id="ALSA-2023:1670" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1670.html"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-06"/>
          <updated date="2023-04-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2176209" id="2176209"></bugzilla>
          <cve public="20230307" href="https://access.redhat.com/security/cve/CVE-2023-25690" impact="Important" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-25690</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670001" comment="httpd is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726022" comment="httpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670003" comment="httpd-core is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726023" comment="httpd-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670005" comment="httpd-devel is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726024" comment="httpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670011" comment="httpd-tools is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726025" comment="httpd-tools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670013" comment="mod_ldap is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726026" comment="mod_ldap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670015" comment="mod_lua is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726027" comment="mod_lua is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670017" comment="mod_proxy_html is earlier than 1:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726028" comment="mod_proxy_html is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670019" comment="mod_session is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726029" comment="mod_session is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670021" comment="mod_ssl is earlier than 1:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726030" comment="mod_ssl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670023" comment="mod_http2 is earlier than 0:1.15.19-3.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670024" comment="mod_http2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670007" comment="httpd-filesystem is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726031" comment="httpd-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231670009" comment="httpd-manual is earlier than 0:2.4.53-7.el9_1.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726032" comment="httpd-manual is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231691" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:1691: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:1691" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1691"/>
        <reference ref_id="CVE-2023-0386" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0386"/>
        <reference ref_id="ALSA-2023:1691" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1691.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the latest AlmaLinux-9.1.z3 Batch (BZ#2182066)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-11"/>
          <updated date="2023-04-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2159505" id="2159505"></bugzilla>
          <cve public="20230124" href="https://access.redhat.com/security/cve/CVE-2023-0386" impact="Important" cwe="CWE-282" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0386</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691024" comment="kernel-rt is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691025" comment="kernel-rt-core is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691026" comment="kernel-rt-debug is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691027" comment="kernel-rt-debug-core is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691028" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691029" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691030" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691031" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691032" comment="kernel-rt-devel is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691033" comment="kernel-rt-kvm is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691034" comment="kernel-rt-modules is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231691035" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-162.23.1.rt21.186.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231693" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1693: postgresql security update (Moderate)</title>
        <reference ref_id="RHSA-2023:1693" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1693"/>
        <reference ref_id="CVE-2022-2625" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2625"/>
        <reference ref_id="CVE-2022-41862" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41862"/>
        <reference ref_id="ALSA-2023:1693" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1693.html"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

* postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625)
* postgresql: Client memory disclosure when connecting with Kerberos to modified server (CVE-2022-41862)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-11"/>
          <updated date="2023-04-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2113825" id="2113825"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2165722" id="2165722"></bugzilla>
          <cve public="20220811" href="https://access.redhat.com/security/cve/CVE-2022-2625" impact="Moderate" cwe="CWE-915" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2022-2625</cve>
          <cve public="20230209" href="https://access.redhat.com/security/cve/CVE-2022-41862" impact="Low" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-41862</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693001" comment="postgresql is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771002" comment="postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693003" comment="postgresql-contrib is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771004" comment="postgresql-contrib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693005" comment="postgresql-docs is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693006" comment="postgresql-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693007" comment="postgresql-plperl is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771006" comment="postgresql-plperl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693009" comment="postgresql-plpython3 is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771008" comment="postgresql-plpython3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693011" comment="postgresql-pltcl is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771010" comment="postgresql-pltcl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693013" comment="postgresql-private-devel is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771012" comment="postgresql-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693015" comment="postgresql-private-libs is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771014" comment="postgresql-private-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693017" comment="postgresql-server is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771016" comment="postgresql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693019" comment="postgresql-server-devel is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771018" comment="postgresql-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693021" comment="postgresql-static is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693022" comment="postgresql-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693023" comment="postgresql-test is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771020" comment="postgresql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693025" comment="postgresql-upgrade is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771022" comment="postgresql-upgrade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693027" comment="postgresql-upgrade-devel is earlier than 0:13.10-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693028" comment="postgresql-upgrade-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231701" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1701: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2023:1701" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1701"/>
        <reference ref_id="CVE-2023-23916" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23916"/>
        <reference ref_id="ALSA-2023:1701" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1701.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: HTTP multi-header compression denial of service (CVE-2023-23916)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-11"/>
          <updated date="2023-04-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2167815" id="2167815"></bugzilla>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-23916" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-23916</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231701001" comment="curl is earlier than 0:7.76.1-19.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231701003" comment="curl-minimal is earlier than 0:7.76.1-19.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231701010" comment="libcurl is earlier than 0:7.76.1-19.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231701011" comment="libcurl-devel is earlier than 0:7.76.1-19.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231701012" comment="libcurl-minimal is earlier than 0:7.76.1-19.el9_1.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231703" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:1703: kernel security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:1703" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1703"/>
        <reference ref_id="CVE-2023-0386" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0386"/>
        <reference ref_id="ALSA-2023:1703" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1703.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168361)
* AlmaLinux9: An application stopped on robust futex used via pthread_mutex_lock() (BZ#2168836)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-11"/>
          <updated date="2023-04-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2159505" id="2159505"></bugzilla>
          <cve public="20230124" href="https://access.redhat.com/security/cve/CVE-2023-0386" impact="Important" cwe="CWE-282" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0386</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703001" comment="bpftool is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703003" comment="kernel is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703007" comment="kernel-core is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703009" comment="kernel-cross-headers is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703011" comment="kernel-debug is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703013" comment="kernel-debug-core is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703015" comment="kernel-debug-devel is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703017" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703019" comment="kernel-debug-modules is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703021" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703023" comment="kernel-devel is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703025" comment="kernel-devel-matched is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703029" comment="kernel-modules is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703031" comment="kernel-modules-extra is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703033" comment="kernel-tools is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703054" comment="kernel-tools-libs is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703055" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703056" comment="kernel-zfcpdump is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703057" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703058" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703059" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703060" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703061" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703051" comment="perf is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703053" comment="python3-perf is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703005" comment="kernel-abi-stablelists is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231703027" comment="kernel-doc is earlier than 0:5.14.0-162.23.1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231786" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:1786: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:1786" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1786"/>
        <reference ref_id="CVE-2023-1945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1945"/>
        <reference ref_id="CVE-2023-29533" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29533"/>
        <reference ref_id="CVE-2023-29535" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29535"/>
        <reference ref_id="CVE-2023-29536" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29536"/>
        <reference ref_id="CVE-2023-29539" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29539"/>
        <reference ref_id="CVE-2023-29541" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29541"/>
        <reference ref_id="CVE-2023-29548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29548"/>
        <reference ref_id="CVE-2023-29550" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29550"/>
        <reference ref_id="ALSA-2023:1786" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1786.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.10.0 ESR.

Security Fix(es):

* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp (BZ#2186102)
* Mozilla: Fullscreen notification obscured (CVE-2023-29533)
* Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535)
* Mozilla: Invalid free from JavaScript code (CVE-2023-29536)
* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550)
* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945)
* Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539)
* Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541)
* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-14"/>
          <updated date="2023-04-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2186101" id="2186101"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186103" id="2186103"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186104" id="2186104"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186105" id="2186105"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186106" id="2186106"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186109" id="2186109"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186110" id="2186110"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2186111" id="2186111"></bugzilla>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-1945" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-1945</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29533" impact="Important" cwe="CWE-425" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29533</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29535" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29535</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29536" impact="Important" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29536</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29539" impact="Moderate" cwe="CWE-159" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-29539</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29541" impact="Moderate" cwe="CWE-434" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-29541</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29548" impact="Low" cwe="CWE-682" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N">CVE-2023-29548</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29550" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29550</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231786004" comment="firefox is earlier than 0:102.10.0-1.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231786005" comment="firefox-x11 is earlier than 0:102.10.0-1.el9_1.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231879" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1879: java-17-openjdk security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:1879" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1879"/>
        <reference ref_id="CVE-2023-21930" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21930"/>
        <reference ref_id="CVE-2023-21937" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21937"/>
        <reference ref_id="CVE-2023-21938" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21938"/>
        <reference ref_id="CVE-2023-21939" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21939"/>
        <reference ref_id="CVE-2023-21954" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21954"/>
        <reference ref_id="CVE-2023-21967" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21967"/>
        <reference ref_id="CVE-2023-21968" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21968"/>
        <reference ref_id="ALSA-2023:1879" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1879.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186804)
* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186811)
* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186807)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-19"/>
          <updated date="2023-04-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2187435" id="2187435"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187441" id="2187441"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187704" id="2187704"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187724" id="2187724"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187758" id="2187758"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187790" id="2187790"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187802" id="2187802"></bugzilla>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21930" impact="Important" cwe="CWE-924" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-21930</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21937" impact="Low" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21937</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21938" impact="Low" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21938</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21939" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21939</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21954" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-21954</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21967" impact="Moderate" cwe="CWE-358" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21967</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21968" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21968</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879001" comment="java-17-openjdk is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879003" comment="java-17-openjdk-demo is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879009" comment="java-17-openjdk-devel is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879017" comment="java-17-openjdk-headless is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879027" comment="java-17-openjdk-jmods is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879035" comment="java-17-openjdk-src is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231879045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.7.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231880" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:1880: java-11-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2023:1880" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1880"/>
        <reference ref_id="CVE-2023-21930" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21930"/>
        <reference ref_id="CVE-2023-21937" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21937"/>
        <reference ref_id="CVE-2023-21938" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21938"/>
        <reference ref_id="CVE-2023-21939" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21939"/>
        <reference ref_id="CVE-2023-21954" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21954"/>
        <reference ref_id="CVE-2023-21967" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21967"/>
        <reference ref_id="CVE-2023-21968" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21968"/>
        <reference ref_id="ALSA-2023:1880" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1880.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-19"/>
          <updated date="2023-04-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2187435" id="2187435"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187441" id="2187441"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187704" id="2187704"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187724" id="2187724"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187758" id="2187758"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187790" id="2187790"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187802" id="2187802"></bugzilla>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21930" impact="Important" cwe="CWE-924" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-21930</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21937" impact="Low" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21937</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21938" impact="Low" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21938</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21939" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21939</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21954" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-21954</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21967" impact="Moderate" cwe="CWE-358" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21967</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21968" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21968</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880001" comment="java-11-openjdk is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880003" comment="java-11-openjdk-demo is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880009" comment="java-11-openjdk-devel is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880017" comment="java-11-openjdk-headless is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880027" comment="java-11-openjdk-jmods is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880035" comment="java-11-openjdk-src is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231880045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.19.0.7-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231909" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:1909: java-1.8.0-openjdk security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:1909" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1909"/>
        <reference ref_id="CVE-2023-21930" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21930"/>
        <reference ref_id="CVE-2023-21937" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21937"/>
        <reference ref_id="CVE-2023-21938" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21938"/>
        <reference ref_id="CVE-2023-21939" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21939"/>
        <reference ref_id="CVE-2023-21954" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21954"/>
        <reference ref_id="CVE-2023-21967" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21967"/>
        <reference ref_id="CVE-2023-21968" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21968"/>
        <reference ref_id="ALSA-2023:1909" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1909.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-25"/>
          <updated date="2023-04-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2187435" id="2187435"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187441" id="2187441"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187704" id="2187704"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187724" id="2187724"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187758" id="2187758"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187790" id="2187790"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187802" id="2187802"></bugzilla>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21930" impact="Important" cwe="CWE-924" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-21930</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21937" impact="Low" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21937</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21938" impact="Low" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21938</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21939" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21939</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21954" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-21954</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21967" impact="Moderate" cwe="CWE-358" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21967</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21968" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21968</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231909025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.372.b07-1.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20231918" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:1918: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:1918" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:1918"/>
        <reference ref_id="CVE-2023-28205" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28205"/>
        <reference ref_id="ALSA-2023:1918" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-1918.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-04-20"/>
          <updated date="2023-04-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2185724" id="2185724"></bugzilla>
          <cve public="20230407" href="https://access.redhat.com/security/cve/CVE-2023-28205" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-28205</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231918001" comment="webkit2gtk3 is earlier than 0:2.36.7-1.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231918003" comment="webkit2gtk3-devel is earlier than 0:2.36.7-1.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231918005" comment="webkit2gtk3-jsc is earlier than 0:2.36.7-1.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231918007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.36.7-1.el9_1.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232074" version="634" class="patch">
      <metadata>
        <title>ALSA-2023:2074: emacs security update (Important)</title>
        <reference ref_id="RHSA-2023:2074" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2074"/>
        <reference ref_id="CVE-2023-28617" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28617"/>
        <reference ref_id="ALSA-2023:2074" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2074.html"/>
        <description>GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.

Security Fix(es):

* emacs: command injection vulnerability in org-mode (CVE-2023-28617)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-02"/>
          <updated date="2023-05-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2180544" id="2180544"></bugzilla>
          <cve public="20230319" href="https://access.redhat.com/security/cve/CVE-2023-28617" impact="Important" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-28617</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074001" comment="emacs is earlier than 1:27.2-6.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074002" comment="emacs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074003" comment="emacs-common is earlier than 1:27.2-6.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074004" comment="emacs-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074007" comment="emacs-lucid is earlier than 1:27.2-6.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074008" comment="emacs-lucid is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074009" comment="emacs-nox is earlier than 1:27.2-6.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074010" comment="emacs-nox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074005" comment="emacs-filesystem is earlier than 1:27.2-6.el9_1.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074006" comment="emacs-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232078" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:2078: libwebp security update (Important)</title>
        <reference ref_id="RHSA-2023:2078" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2078"/>
        <reference ref_id="CVE-2023-1999" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1999"/>
        <reference ref_id="ALSA-2023:2078" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2078.html"/>
        <description>The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.

Security Fix(es):

* Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-02"/>
          <updated date="2023-05-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2186102" id="2186102"></bugzilla>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-1999" impact="Important" cwe="CWE-415" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-1999</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232078001" comment="libwebp is earlier than 0:1.2.0-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232078002" comment="libwebp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232078003" comment="libwebp-devel is earlier than 0:1.2.0-6.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232078004" comment="libwebp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232127" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2127: samba security update (Important)</title>
        <reference ref_id="RHSA-2023:2127" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2127"/>
        <reference ref_id="CVE-2022-38023" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38023"/>
        <reference ref_id="ALSA-2023:2127" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2127.html"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

Security Fix(es):

* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-04"/>
          <updated date="2023-05-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2154362" id="2154362"></bugzilla>
          <cve public="20221216" href="https://access.redhat.com/security/cve/CVE-2022-38023" impact="Important" cwe="CWE-328" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-38023</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127001" comment="ctdb is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317002" comment="ctdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127048" comment="libsmbclient is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317004" comment="libsmbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127049" comment="libsmbclient-devel is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317006" comment="libsmbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127050" comment="libwbclient is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317008" comment="libwbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127051" comment="libwbclient-devel is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317010" comment="libwbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127052" comment="python3-samba is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317012" comment="python3-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127053" comment="samba is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317014" comment="samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127054" comment="samba-client is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317016" comment="samba-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127055" comment="samba-client-libs is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317018" comment="samba-client-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127056" comment="samba-common-libs is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317022" comment="samba-common-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127057" comment="samba-common-tools is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317024" comment="samba-common-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127058" comment="samba-devel is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317026" comment="samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127059" comment="samba-krb5-printing is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317028" comment="samba-krb5-printing is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127060" comment="samba-libs is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317030" comment="samba-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127061" comment="samba-test is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317034" comment="samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127062" comment="samba-test-libs is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317036" comment="samba-test-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127063" comment="samba-vfs-iouring is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317038" comment="samba-vfs-iouring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127064" comment="samba-winbind is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317040" comment="samba-winbind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127065" comment="samba-winbind-clients is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317042" comment="samba-winbind-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127066" comment="samba-winbind-krb5-locator is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317044" comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127067" comment="samba-winbind-modules is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317046" comment="samba-winbind-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127068" comment="samba-winexe is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317048" comment="samba-winexe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127019" comment="samba-common is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317020" comment="samba-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232127031" comment="samba-pidl is earlier than 0:4.16.4-103.el9_1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317032" comment="samba-pidl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232148" version="640" class="patch">
      <metadata>
        <title>ALSA-2023:2148: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:2148" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2148"/>
        <reference ref_id="CVE-2021-26341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-26341"/>
        <reference ref_id="CVE-2021-33655" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-33655"/>
        <reference ref_id="CVE-2022-1462" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1462"/>
        <reference ref_id="CVE-2022-1789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1789"/>
        <reference ref_id="CVE-2022-1882" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1882"/>
        <reference ref_id="CVE-2022-20141" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-20141"/>
        <reference ref_id="CVE-2022-21505" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21505"/>
        <reference ref_id="CVE-2022-2196" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2196"/>
        <reference ref_id="CVE-2022-2663" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2663"/>
        <reference ref_id="CVE-2022-28388" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28388"/>
        <reference ref_id="CVE-2022-3028" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3028"/>
        <reference ref_id="CVE-2022-33743" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-33743"/>
        <reference ref_id="CVE-2022-3435" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3435"/>
        <reference ref_id="CVE-2022-3522" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3522"/>
        <reference ref_id="CVE-2022-3524" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3524"/>
        <reference ref_id="CVE-2022-3566" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3566"/>
        <reference ref_id="CVE-2022-3567" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3567"/>
        <reference ref_id="CVE-2022-3619" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3619"/>
        <reference ref_id="CVE-2022-3623" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3623"/>
        <reference ref_id="CVE-2022-3625" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3625"/>
        <reference ref_id="CVE-2022-3628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3628"/>
        <reference ref_id="CVE-2022-3640" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3640"/>
        <reference ref_id="CVE-2022-3707" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3707"/>
        <reference ref_id="CVE-2022-39188" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39188"/>
        <reference ref_id="CVE-2022-39189" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39189"/>
        <reference ref_id="CVE-2022-4128" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4128"/>
        <reference ref_id="CVE-2022-4129" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4129"/>
        <reference ref_id="CVE-2022-41674" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41674"/>
        <reference ref_id="CVE-2022-42703" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42703"/>
        <reference ref_id="CVE-2022-42720" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42720"/>
        <reference ref_id="CVE-2022-42721" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42721"/>
        <reference ref_id="CVE-2022-42722" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42722"/>
        <reference ref_id="CVE-2022-42896" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42896"/>
        <reference ref_id="CVE-2022-43750" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43750"/>
        <reference ref_id="CVE-2022-47929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-47929"/>
        <reference ref_id="CVE-2023-0394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0394"/>
        <reference ref_id="CVE-2023-0461" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0461"/>
        <reference ref_id="CVE-2023-0590" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0590"/>
        <reference ref_id="CVE-2023-1195" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1195"/>
        <reference ref_id="CVE-2023-1382" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1382"/>
        <reference ref_id="ALSA-2023:2148" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2148.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)
* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)
* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
* memory leak in ipv6_renew_options() (CVE-2022-3524)
* data races around icsk-&gt;icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
* data races around sk-&gt;sk_prot (CVE-2022-3567)
* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)
* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
* lockdown bypass using IMA (CVE-2022-21505)
* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)
* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
* Denial of service in beacon protection for P2P-device (CVE-2022-42722)
* memory corruption in usbmon driver (CVE-2022-43750)
* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)
* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
* denial of service in tipc_conn_close (CVE-2023-1382)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2160023" id="2160023"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2061703" id="2061703"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073091" id="2073091"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2078466" id="2078466"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2089701" id="2089701"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090723" id="2090723"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106830" id="2106830"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107924" id="2107924"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108691" id="2108691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114937" id="2114937"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2122228" id="2122228"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123056" id="2123056"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2124788" id="2124788"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130141" id="2130141"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133483" id="2133483"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133490" id="2133490"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134377" id="2134377"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134380" id="2134380"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134451" id="2134451"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134506" id="2134506"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134517" id="2134517"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134528" id="2134528"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2137979" id="2137979"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2139610" id="2139610"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143893" id="2143893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143943" id="2143943"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2144720" id="2144720"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2147364" id="2147364"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150947" id="2150947"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150960" id="2150960"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150979" id="2150979"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151270" id="2151270"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2154171" id="2154171"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2154235" id="2154235"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162120" id="2162120"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2165721" id="2165721"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2165741" id="2165741"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2168246" id="2168246"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2176192" id="2176192"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2177371" id="2177371"></bugzilla>
          <cve public="20220308" href="https://access.redhat.com/security/cve/CVE-2021-26341" impact="Moderate" cwe="CWE-668-&gt;CWE-552" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2021-26341</cve>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2021-33655" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2021-33655</cve>
          <cve public="20220509" href="https://access.redhat.com/security/cve/CVE-2022-1462" impact="Moderate" cwe="CWE-362-&gt;CWE-366" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2022-1462</cve>
          <cve public="20220525" href="https://access.redhat.com/security/cve/CVE-2022-1789" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H">CVE-2022-1789</cve>
          <cve public="20220507" href="https://access.redhat.com/security/cve/CVE-2022-1882" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1882</cve>
          <cve public="20210716" href="https://access.redhat.com/security/cve/CVE-2022-20141" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-20141</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21505" impact="Moderate" cwe="CWE-305" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-21505</cve>
          <cve public="20220928" href="https://access.redhat.com/security/cve/CVE-2022-2196" impact="Moderate" cwe="CWE-1188" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-2196</cve>
          <cve public="20220830" href="https://access.redhat.com/security/cve/CVE-2022-2663" impact="Moderate" cwe="CWE-923" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-2663</cve>
          <cve public="20220404" href="https://access.redhat.com/security/cve/CVE-2022-28388" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-28388</cve>
          <cve public="20220721" href="https://access.redhat.com/security/cve/CVE-2022-3028" impact="Moderate" cwe="CWE-667-&gt;CWE-362-&gt;(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3028</cve>
          <cve public="20220704" href="https://access.redhat.com/security/cve/CVE-2022-33743" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-33743</cve>
          <cve public="20221008" href="https://access.redhat.com/security/cve/CVE-2022-3435" impact="Moderate" cwe="(CWE-119|CWE-125)" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-3435</cve>
          <cve public="20221012" href="https://access.redhat.com/security/cve/CVE-2022-3522" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3522</cve>
          <cve public="20221012" href="https://access.redhat.com/security/cve/CVE-2022-3524" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3524</cve>
          <cve public="20221006" href="https://access.redhat.com/security/cve/CVE-2022-3566" impact="Moderate" cwe="CWE-366" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L">CVE-2022-3566</cve>
          <cve public="20221006" href="https://access.redhat.com/security/cve/CVE-2022-3567" impact="Moderate" cwe="CWE-421" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2022-3567</cve>
          <cve public="20221020" href="https://access.redhat.com/security/cve/CVE-2022-3619" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-3619</cve>
          <cve public="20220901" href="https://access.redhat.com/security/cve/CVE-2022-3623" impact="Moderate" cwe="CWE-123" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2022-3623</cve>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-3625" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3625</cve>
          <cve public="20221022" href="https://access.redhat.com/security/cve/CVE-2022-3628" impact="Moderate" cwe="CWE-119-&gt;CWE-120" cvss3="CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3628</cve>
          <cve public="20221017" href="https://access.redhat.com/security/cve/CVE-2022-3640" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-3640</cve>
          <cve public="20221007" href="https://access.redhat.com/security/cve/CVE-2022-3707" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3707</cve>
          <cve public="20220706" href="https://access.redhat.com/security/cve/CVE-2022-39188" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39188</cve>
          <cve public="20220530" href="https://access.redhat.com/security/cve/CVE-2022-39189" impact="Moderate" cwe="CWE-440-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-39189</cve>
          <cve public="20220711" href="https://access.redhat.com/security/cve/CVE-2022-4128" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4128</cve>
          <cve public="20220810" href="https://access.redhat.com/security/cve/CVE-2022-4129" impact="Moderate" cwe="CWE-667-&gt;CWE-362-&gt;CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4129</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-41674" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2022-41674</cve>
          <cve public="20221009" href="https://access.redhat.com/security/cve/CVE-2022-42703" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42703</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-42720" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2022-42720</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-42721" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42721</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-42722" impact="Moderate" cwe="CWE-705" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42722</cve>
          <cve public="20221103" href="https://access.redhat.com/security/cve/CVE-2022-42896" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2022-42896</cve>
          <cve public="20220922" href="https://access.redhat.com/security/cve/CVE-2022-43750" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-43750</cve>
          <cve public="20230109" href="https://access.redhat.com/security/cve/CVE-2022-47929" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H">CVE-2022-47929</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-0394" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0394</cve>
          <cve public="20230223" href="https://access.redhat.com/security/cve/CVE-2023-0461" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0461</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2023-0590" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0590</cve>
          <cve public="20221002" href="https://access.redhat.com/security/cve/CVE-2023-1195" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-1195</cve>
          <cve public="20221118" href="https://access.redhat.com/security/cve/CVE-2023-1382" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-1382</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148028" comment="kernel-rt is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148029" comment="kernel-rt-core is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148030" comment="kernel-rt-debug is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148031" comment="kernel-rt-debug-core is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148032" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148033" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148034" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148035" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148036" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148037" comment="kernel-rt-devel is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148038" comment="kernel-rt-kvm is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148039" comment="kernel-rt-modules is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148040" comment="kernel-rt-modules-core is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148041" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-284.11.1.rt14.296.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232161" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:2161: fence-agents security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2161" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2161"/>
        <reference ref_id="CVE-2022-36087" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36087"/>
        <reference ref_id="ALSA-2023:2161" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2161.html"/>
        <description>The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. 

Security Fix(es):

* python-oauthlib: DoS when attacker provides malicious IPV6 URI (CVE-2022-36087)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2128425" id="2128425"></bugzilla>
          <cve public="20220909" href="https://access.redhat.com/security/cve/CVE-2022-36087" impact="Moderate" cwe="CWE-601" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-36087</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161111" comment="fence-agents-aliyun is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161002" comment="fence-agents-aliyun is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161003" comment="fence-agents-all is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161004" comment="fence-agents-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161112" comment="fence-agents-aws is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161012" comment="fence-agents-aws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161113" comment="fence-agents-azure-arm is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161014" comment="fence-agents-azure-arm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161114" comment="fence-agents-compute is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161026" comment="fence-agents-compute is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161115" comment="fence-agents-gce is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161036" comment="fence-agents-gce is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161063" comment="fence-agents-kdump is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161064" comment="fence-agents-kdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161065" comment="fence-agents-kubevirt is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161066" comment="fence-agents-kubevirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161116" comment="fence-agents-openstack is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161072" comment="fence-agents-openstack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161073" comment="fence-agents-redfish is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161074" comment="fence-agents-redfish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161117" comment="fence-agents-zvm is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161094" comment="fence-agents-zvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161118" comment="fence-virt is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161096" comment="fence-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161119" comment="fence-virtd is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161098" comment="fence-virtd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161120" comment="fence-virtd-cpg is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161100" comment="fence-virtd-cpg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161121" comment="fence-virtd-libvirt is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161102" comment="fence-virtd-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161122" comment="fence-virtd-multicast is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161104" comment="fence-virtd-multicast is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161123" comment="fence-virtd-serial is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161106" comment="fence-virtd-serial is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161124" comment="fence-virtd-tcp is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161108" comment="fence-virtd-tcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161125" comment="ha-cloud-support is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161110" comment="ha-cloud-support is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161005" comment="fence-agents-amt-ws is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161006" comment="fence-agents-amt-ws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161007" comment="fence-agents-apc is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161008" comment="fence-agents-apc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161009" comment="fence-agents-apc-snmp is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161010" comment="fence-agents-apc-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161015" comment="fence-agents-bladecenter is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161016" comment="fence-agents-bladecenter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161017" comment="fence-agents-brocade is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161018" comment="fence-agents-brocade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161019" comment="fence-agents-cisco-mds is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161020" comment="fence-agents-cisco-mds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161021" comment="fence-agents-cisco-ucs is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161022" comment="fence-agents-cisco-ucs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161023" comment="fence-agents-common is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161024" comment="fence-agents-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161027" comment="fence-agents-drac5 is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161028" comment="fence-agents-drac5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161029" comment="fence-agents-eaton-snmp is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161030" comment="fence-agents-eaton-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161031" comment="fence-agents-emerson is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161032" comment="fence-agents-emerson is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161033" comment="fence-agents-eps is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161034" comment="fence-agents-eps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161037" comment="fence-agents-heuristics-ping is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161038" comment="fence-agents-heuristics-ping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161039" comment="fence-agents-hpblade is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161040" comment="fence-agents-hpblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161041" comment="fence-agents-ibm-powervs is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161042" comment="fence-agents-ibm-powervs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161043" comment="fence-agents-ibm-vpc is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161044" comment="fence-agents-ibm-vpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161045" comment="fence-agents-ibmblade is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161046" comment="fence-agents-ibmblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161047" comment="fence-agents-ifmib is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161048" comment="fence-agents-ifmib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161049" comment="fence-agents-ilo-moonshot is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161050" comment="fence-agents-ilo-moonshot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161051" comment="fence-agents-ilo-mp is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161052" comment="fence-agents-ilo-mp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161053" comment="fence-agents-ilo-ssh is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161054" comment="fence-agents-ilo-ssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161055" comment="fence-agents-ilo2 is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161056" comment="fence-agents-ilo2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161057" comment="fence-agents-intelmodular is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161058" comment="fence-agents-intelmodular is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161059" comment="fence-agents-ipdu is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161060" comment="fence-agents-ipdu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161061" comment="fence-agents-ipmilan is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161062" comment="fence-agents-ipmilan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161067" comment="fence-agents-lpar is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161068" comment="fence-agents-lpar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161069" comment="fence-agents-mpath is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161070" comment="fence-agents-mpath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161075" comment="fence-agents-rhevm is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161076" comment="fence-agents-rhevm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161077" comment="fence-agents-rsa is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161078" comment="fence-agents-rsa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161079" comment="fence-agents-rsb is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161080" comment="fence-agents-rsb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161081" comment="fence-agents-sbd is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161082" comment="fence-agents-sbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161083" comment="fence-agents-scsi is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161084" comment="fence-agents-scsi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161085" comment="fence-agents-virsh is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161086" comment="fence-agents-virsh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161087" comment="fence-agents-vmware-rest is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161088" comment="fence-agents-vmware-rest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161089" comment="fence-agents-vmware-soap is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161090" comment="fence-agents-vmware-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161091" comment="fence-agents-wti is earlier than 0:4.10.0-43.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161092" comment="fence-agents-wti is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232162" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2162: qemu-kvm security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2162" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2162"/>
        <reference ref_id="CVE-2022-3165" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3165"/>
        <reference ref_id="CVE-2022-4172" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4172"/>
        <reference ref_id="ALSA-2023:2162" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2162.html"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

The following packages have been upgraded to a later upstream version: qemu-kvm (7.2.0). (BZ#2111769, BZ#2135806)

Security Fix(es):

* QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion (CVE-2022-3165)
* QEMU: ACPI ERST: memory corruption issues in read_erst_record and write_erst_record (CVE-2022-4172)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2129739" id="2129739"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2149105" id="2149105"></bugzilla>
          <cve public="20220925" href="https://access.redhat.com/security/cve/CVE-2022-3165" impact="Moderate" cwe="CWE-191-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3165</cve>
          <cve public="20221019" href="https://access.redhat.com/security/cve/CVE-2022-4172" impact="Moderate" cwe="(CWE-120|CWE-190)" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2022-4172</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162001" comment="qemu-guest-agent is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162003" comment="qemu-img is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162038" comment="qemu-kvm is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162039" comment="qemu-kvm-audio-pa is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162040" comment="qemu-kvm-block-curl is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162041" comment="qemu-kvm-block-rbd is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162042" comment="qemu-kvm-common is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162043" comment="qemu-kvm-core is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162044" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162045" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162046" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162047" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162048" comment="qemu-kvm-device-usb-host is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162049" comment="qemu-kvm-device-usb-redirect is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162050" comment="qemu-kvm-docs is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162051" comment="qemu-kvm-tools is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162052" comment="qemu-kvm-ui-egl-headless is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162053" comment="qemu-kvm-ui-opengl is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232162054" comment="qemu-pr-helper is earlier than 17:7.2.0-14.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232165" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2165: edk2 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:2165" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2165"/>
        <reference ref_id="CVE-2021-38578" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-38578"/>
        <reference ref_id="CVE-2022-4304" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4304"/>
        <reference ref_id="CVE-2022-4450" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4450"/>
        <reference ref_id="CVE-2023-0215" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0215"/>
        <reference ref_id="CVE-2023-0286" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0286"/>
        <reference ref_id="ALSA-2023:2165" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2165.html"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* edk2: integer underflow in SmmEntryPoint function leads to potential SMM privilege escalation (CVE-2021-38578)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1960321" id="1960321"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164440" id="2164440"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164487" id="2164487"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164492" id="2164492"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164494" id="2164494"></bugzilla>
          <cve public="20220303" href="https://access.redhat.com/security/cve/CVE-2021-38578" impact="Moderate" cwe="(CWE-124|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L">CVE-2021-38578</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2022-4304" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-4304</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2022-4450" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4450</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0215" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0215</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0286" impact="Moderate" cwe="CWE-704" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H">CVE-2023-0286</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165005" comment="edk2-tools is earlier than 0:20221207gitfff6d81270b5-9.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165006" comment="edk2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165001" comment="edk2-aarch64 is earlier than 0:20221207gitfff6d81270b5-9.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165002" comment="edk2-aarch64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165003" comment="edk2-ovmf is earlier than 0:20221207gitfff6d81270b5-9.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165004" comment="edk2-ovmf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165007" comment="edk2-tools-doc is earlier than 0:20221207gitfff6d81270b5-9.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165008" comment="edk2-tools-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232166" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2166: freeradius security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2166" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2166"/>
        <reference ref_id="CVE-2022-41859" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41859"/>
        <reference ref_id="CVE-2022-41860" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41860"/>
        <reference ref_id="CVE-2022-41861" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41861"/>
        <reference ref_id="ALSA-2023:2166" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2166.html"/>
        <description>FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.

Security Fix(es):

* freeradius: Information leakage in EAP-PWD (CVE-2022-41859)
* freeradius: Crash on unknown option in EAP-SIM (CVE-2022-41860)
* freeradius: Crash on invalid abinary data (CVE-2022-41861)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2078483" id="2078483"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2078485" id="2078485"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2078487" id="2078487"></bugzilla>
          <cve public="20220422" href="https://access.redhat.com/security/cve/CVE-2022-41859" impact="Moderate" cwe="CWE-522-&gt;CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-41859</cve>
          <cve public="20220422" href="https://access.redhat.com/security/cve/CVE-2022-41860" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41860</cve>
          <cve public="20220422" href="https://access.redhat.com/security/cve/CVE-2022-41861" impact="Moderate" cwe="CWE-20-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41861</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166001" comment="freeradius is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166002" comment="freeradius is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166003" comment="freeradius-devel is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166004" comment="freeradius-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166005" comment="freeradius-doc is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166006" comment="freeradius-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166007" comment="freeradius-krb5 is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166008" comment="freeradius-krb5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166009" comment="freeradius-ldap is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166010" comment="freeradius-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166011" comment="freeradius-mysql is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166012" comment="freeradius-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166013" comment="freeradius-perl is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166014" comment="freeradius-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166015" comment="freeradius-postgresql is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166016" comment="freeradius-postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166017" comment="freeradius-rest is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166018" comment="freeradius-rest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166019" comment="freeradius-sqlite is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166020" comment="freeradius-sqlite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166021" comment="freeradius-unixODBC is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166022" comment="freeradius-unixODBC is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166023" comment="freeradius-utils is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166024" comment="freeradius-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166025" comment="python3-freeradius is earlier than 0:3.0.21-37.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232166026" comment="python3-freeradius is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232177" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2177: grafana-pcp security and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2177" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2177"/>
        <reference ref_id="CVE-2022-27664" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27664"/>
        <reference ref_id="ALSA-2023:2177" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2177.html"/>
        <description>The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.

Security Fix(es):

* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2124669" id="2124669"></bugzilla>
          <cve public="20220906" href="https://access.redhat.com/security/cve/CVE-2022-27664" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27664</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20232177001" comment="grafana-pcp is earlier than 0:5.1.1-1.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20246946002" comment="grafana-pcp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232204" version="641" class="patch">
      <metadata>
        <title>ALSA-2023:2204: Image Builder security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2204" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2204"/>
        <reference ref_id="CVE-2022-27664" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27664"/>
        <reference ref_id="CVE-2022-2879" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2879"/>
        <reference ref_id="CVE-2022-2880" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2880"/>
        <reference ref_id="CVE-2022-41715" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41715"/>
        <reference ref_id="CVE-2022-41717" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41717"/>
        <reference ref_id="ALSA-2023:2204" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2204.html"/>
        <description>Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.

Security Fix(es):

* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2124669" id="2124669"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2132867" id="2132867"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2132868" id="2132868"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2132872" id="2132872"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161274" id="2161274"></bugzilla>
          <cve public="20220906" href="https://access.redhat.com/security/cve/CVE-2022-27664" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27664</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-2879" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2879</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-2880" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-2880</cve>
          <cve public="20221004" href="https://access.redhat.com/security/cve/CVE-2022-41715" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41715</cve>
          <cve public="20221130" href="https://access.redhat.com/security/cve/CVE-2022-41717" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-41717</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204001" comment="weldr-client is earlier than 0:35.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227950002" comment="weldr-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204011" comment="osbuild-composer is earlier than 0:76-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204004" comment="osbuild-composer is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204012" comment="osbuild-composer-core is earlier than 0:76-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204006" comment="osbuild-composer-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204013" comment="osbuild-composer-dnf-json is earlier than 0:76-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204008" comment="osbuild-composer-dnf-json is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204014" comment="osbuild-composer-worker is earlier than 0:76-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204010" comment="osbuild-composer-worker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232216" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:2216: gdk-pixbuf2 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2216" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2216"/>
        <reference ref_id="CVE-2021-44648" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-44648"/>
        <reference ref_id="CVE-2021-46829" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-46829"/>
        <reference ref_id="ALSA-2023:2216" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2216.html"/>
        <description>The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.

Security Fix(es):

* gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data (CVE-2021-44648)
* gdk-pixbuf: heap-based buffer overflow when compositing or clearing frames in GIF files (CVE-2021-46829)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2043722" id="2043722"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114940" id="2114940"></bugzilla>
          <cve public="20220112" href="https://access.redhat.com/security/cve/CVE-2021-44648" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2021-44648</cve>
          <cve public="20220724" href="https://access.redhat.com/security/cve/CVE-2021-46829" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2021-46829</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216001" comment="gdk-pixbuf2 is earlier than 0:2.42.6-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216002" comment="gdk-pixbuf2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216003" comment="gdk-pixbuf2-devel is earlier than 0:2.42.6-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216004" comment="gdk-pixbuf2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216005" comment="gdk-pixbuf2-modules is earlier than 0:2.42.6-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216006" comment="gdk-pixbuf2-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232236" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2236: toolbox security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2236" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2236"/>
        <reference ref_id="CVE-2022-27664" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27664"/>
        <reference ref_id="CVE-2022-32189" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32189"/>
        <reference ref_id="CVE-2022-41717" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41717"/>
        <reference ref_id="ALSA-2023:2236" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2236.html"/>
        <description>Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.

Security Fix(es):

* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2113814" id="2113814"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2124669" id="2124669"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161274" id="2161274"></bugzilla>
          <cve public="20220906" href="https://access.redhat.com/security/cve/CVE-2022-27664" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-27664</cve>
          <cve public="20220801" href="https://access.redhat.com/security/cve/CVE-2022-32189" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-32189</cve>
          <cve public="20221130" href="https://access.redhat.com/security/cve/CVE-2022-41717" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-41717</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232236001" comment="toolbox is earlier than 0:0.0.99.3-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098002" comment="toolbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232236003" comment="toolbox-tests is earlier than 0:0.0.99.3-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098004" comment="toolbox-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232248" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2248: xorg-x11-server security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2248" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2248"/>
        <reference ref_id="CVE-2022-3550" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3550"/>
        <reference ref_id="CVE-2022-3551" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3551"/>
        <reference ref_id="CVE-2022-4283" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4283"/>
        <reference ref_id="CVE-2022-46340" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46340"/>
        <reference ref_id="CVE-2022-46341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46341"/>
        <reference ref_id="CVE-2022-46342" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46342"/>
        <reference ref_id="CVE-2022-46343" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46343"/>
        <reference ref_id="CVE-2022-46344" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46344"/>
        <reference ref_id="CVE-2023-0494" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0494"/>
        <reference ref_id="ALSA-2023:2248" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2248.html"/>
        <description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c (CVE-2022-3550)
* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)
* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)
* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)
* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)
* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)
* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
* xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c (CVE-2022-3551)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2140698" id="2140698"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140701" id="2140701"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151755" id="2151755"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151756" id="2151756"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151757" id="2151757"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151758" id="2151758"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151760" id="2151760"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151761" id="2151761"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2165995" id="2165995"></bugzilla>
          <cve public="20221017" href="https://access.redhat.com/security/cve/CVE-2022-3550" impact="Important" cwe="(CWE-119|CWE-120)" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3550</cve>
          <cve public="20221017" href="https://access.redhat.com/security/cve/CVE-2022-3551" impact="Moderate" cwe="(CWE-401|CWE-404)" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3551</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-4283" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4283</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46340" impact="Important" cwe="CWE-121" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46340</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46341" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46341</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46342" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46342</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46343" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46343</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46344" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46344</cve>
          <cve public="20230207" href="https://access.redhat.com/security/cve/CVE-2023-0494" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0494</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248001" comment="xorg-x11-server-Xdmx is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221002" comment="xorg-x11-server-Xdmx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248003" comment="xorg-x11-server-Xephyr is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221004" comment="xorg-x11-server-Xephyr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248005" comment="xorg-x11-server-Xnest is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221006" comment="xorg-x11-server-Xnest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248007" comment="xorg-x11-server-Xorg is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221008" comment="xorg-x11-server-Xorg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248009" comment="xorg-x11-server-Xvfb is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221010" comment="xorg-x11-server-Xvfb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248011" comment="xorg-x11-server-common is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221012" comment="xorg-x11-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248016" comment="xorg-x11-server-devel is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221014" comment="xorg-x11-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232248015" comment="xorg-x11-server-source is earlier than 0:1.20.11-17.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221016" comment="xorg-x11-server-source is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232256" version="651" class="patch">
      <metadata>
        <title>ALSA-2023:2256: webkit2gtk3 security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:2256" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2256"/>
        <reference ref_id="CVE-2022-32886" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32886"/>
        <reference ref_id="CVE-2022-32888" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32888"/>
        <reference ref_id="CVE-2022-32923" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32923"/>
        <reference ref_id="CVE-2022-42799" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42799"/>
        <reference ref_id="CVE-2022-42823" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42823"/>
        <reference ref_id="CVE-2022-42824" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42824"/>
        <reference ref_id="CVE-2022-42826" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42826"/>
        <reference ref_id="CVE-2022-42852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42852"/>
        <reference ref_id="CVE-2022-42863" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42863"/>
        <reference ref_id="CVE-2022-42867" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42867"/>
        <reference ref_id="CVE-2022-46691" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46691"/>
        <reference ref_id="CVE-2022-46692" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46692"/>
        <reference ref_id="CVE-2022-46698" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46698"/>
        <reference ref_id="CVE-2022-46699" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46699"/>
        <reference ref_id="CVE-2022-46700" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46700"/>
        <reference ref_id="CVE-2023-23517" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23517"/>
        <reference ref_id="CVE-2023-23518" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23518"/>
        <reference ref_id="CVE-2023-25358" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25358"/>
        <reference ref_id="CVE-2023-25360" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25360"/>
        <reference ref_id="CVE-2023-25361" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25361"/>
        <reference ref_id="CVE-2023-25362" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25362"/>
        <reference ref_id="CVE-2023-25363" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25363"/>
        <reference ref_id="ALSA-2023:2256" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2256.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2128643" id="2128643"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140501" id="2140501"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140502" id="2140502"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140503" id="2140503"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140504" id="2140504"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140505" id="2140505"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156986" id="2156986"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156987" id="2156987"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156989" id="2156989"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156990" id="2156990"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156991" id="2156991"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156992" id="2156992"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156993" id="2156993"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2156994" id="2156994"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2167715" id="2167715"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2167716" id="2167716"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2167717" id="2167717"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2175099" id="2175099"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2175101" id="2175101"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2175103" id="2175103"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2175105" id="2175105"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2175107" id="2175107"></bugzilla>
          <cve public="20220912" href="https://access.redhat.com/security/cve/CVE-2022-32886" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-32886</cve>
          <cve public="20221031" href="https://access.redhat.com/security/cve/CVE-2022-32888" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-32888</cve>
          <cve public="20221031" href="https://access.redhat.com/security/cve/CVE-2022-32923" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2022-32923</cve>
          <cve public="20221031" href="https://access.redhat.com/security/cve/CVE-2022-42799" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2022-42799</cve>
          <cve public="20221031" href="https://access.redhat.com/security/cve/CVE-2022-42823" impact="Moderate" cwe="CWE-843" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42823</cve>
          <cve public="20221031" href="https://access.redhat.com/security/cve/CVE-2022-42824" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2022-42824</cve>
          <cve public="20230202" href="https://access.redhat.com/security/cve/CVE-2022-42826" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42826</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-42852" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2022-42852</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-42863" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42863</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-42867" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-42867</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-46691" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-46691</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-46692" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2022-46692</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-46698" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2022-46698</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-46699" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-46699</cve>
          <cve public="20221215" href="https://access.redhat.com/security/cve/CVE-2022-46700" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-46700</cve>
          <cve public="20230202" href="https://access.redhat.com/security/cve/CVE-2023-23517" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-23517</cve>
          <cve public="20230202" href="https://access.redhat.com/security/cve/CVE-2023-23518" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-23518</cve>
          <cve public="20220713" href="https://access.redhat.com/security/cve/CVE-2023-25358" impact="Moderate" cwe="CWE-94-&gt;CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25358</cve>
          <cve public="20220713" href="https://access.redhat.com/security/cve/CVE-2023-25360" impact="Moderate" cwe="CWE-94-&gt;CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25360</cve>
          <cve public="20220713" href="https://access.redhat.com/security/cve/CVE-2023-25361" impact="Moderate" cwe="CWE-94-&gt;CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25361</cve>
          <cve public="20220713" href="https://access.redhat.com/security/cve/CVE-2023-25362" impact="Moderate" cwe="CWE-94-&gt;CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25362</cve>
          <cve public="20220713" href="https://access.redhat.com/security/cve/CVE-2023-25363" impact="Moderate" cwe="CWE-94-&gt;CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-25363</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232256001" comment="webkit2gtk3 is earlier than 0:2.38.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232256003" comment="webkit2gtk3-devel is earlier than 0:2.38.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232256005" comment="webkit2gtk3-jsc is earlier than 0:2.38.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232256007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.38.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232257" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:2257: tigervnc security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2257" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2257"/>
        <reference ref_id="CVE-2022-4283" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4283"/>
        <reference ref_id="CVE-2022-46340" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46340"/>
        <reference ref_id="CVE-2022-46341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46341"/>
        <reference ref_id="CVE-2022-46342" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46342"/>
        <reference ref_id="CVE-2022-46343" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46343"/>
        <reference ref_id="CVE-2022-46344" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46344"/>
        <reference ref_id="ALSA-2023:2257" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2257.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)
* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)
* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)
* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)
* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)
* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2151755" id="2151755"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151756" id="2151756"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151757" id="2151757"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151758" id="2151758"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151760" id="2151760"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151761" id="2151761"></bugzilla>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-4283" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-4283</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46340" impact="Important" cwe="CWE-121" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46340</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46341" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46341</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46342" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46342</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46343" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46343</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2022-46344" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-46344</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257001" comment="tigervnc is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257009" comment="tigervnc-server is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257011" comment="tigervnc-server-minimal is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257013" comment="tigervnc-server-module is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257003" comment="tigervnc-icons is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257005" comment="tigervnc-license is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232257007" comment="tigervnc-selinux is earlier than 0:1.12.0-13.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232259" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2259: poppler security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2259" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2259"/>
        <reference ref_id="CVE-2022-38784" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38784"/>
        <reference ref_id="ALSA-2023:2259" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2259.html"/>
        <description>Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.

Security Fix(es):

* poppler: integer overflow in JBIG2 decoder using malformed files (CVE-2022-38784)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2124527" id="2124527"></bugzilla>
          <cve public="20220830" href="https://access.redhat.com/security/cve/CVE-2022-38784" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-38784</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259001" comment="poppler is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151002" comment="poppler is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259003" comment="poppler-cpp is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151004" comment="poppler-cpp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259005" comment="poppler-cpp-devel is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151006" comment="poppler-cpp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259007" comment="poppler-devel is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151008" comment="poppler-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259009" comment="poppler-glib is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151010" comment="poppler-glib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259011" comment="poppler-glib-devel is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151012" comment="poppler-glib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259013" comment="poppler-qt5 is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151014" comment="poppler-qt5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259015" comment="poppler-qt5-devel is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151016" comment="poppler-qt5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232259018" comment="poppler-utils is earlier than 0:21.01.0-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228151018" comment="poppler-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232260" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2260: gstreamer1-plugins-good security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2260" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2260"/>
        <reference ref_id="CVE-2022-1920" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1920"/>
        <reference ref_id="CVE-2022-1921" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1921"/>
        <reference ref_id="CVE-2022-1922" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1922"/>
        <reference ref_id="CVE-2022-1923" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1923"/>
        <reference ref_id="CVE-2022-1924" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1924"/>
        <reference ref_id="CVE-2022-1925" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1925"/>
        <reference ref_id="CVE-2022-2122" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2122"/>
        <reference ref_id="ALSA-2023:2260" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2260.html"/>
        <description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.

Security Fix(es):

* gstreamer-plugins-good: Potential heap overwrite in gst_matroska_demux_add_wvpk_header() (CVE-2022-1920)
* gstreamer-plugins-good: Heap-based buffer overflow in the avi demuxer when handling certain AVI files (CVE-2022-1921)
* gstreamer-plugins-good: Potential heap overwrite in mkv demuxing using zlib decompression (CVE-2022-1922)
* gstreamer-plugins-good: Potential heap overwrite in mkv demuxing using bz2 decompression (CVE-2022-1923)
* gstreamer-plugins-good: Potential heap overwrite in mkv demuxing using lzo decompression (CVE-2022-1924)
* gstreamer-plugins-good: Potential heap overwrite in mkv demuxing using HEADERSTRIP decompression (CVE-2022-1925)
* gstreamer-plugins-good: Potential heap overwrite in mp4 demuxing using zlib decompression (CVE-2022-2122)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2130935" id="2130935"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130949" id="2130949"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130955" id="2130955"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130959" id="2130959"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2131003" id="2131003"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2131007" id="2131007"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2131018" id="2131018"></bugzilla>
          <cve public="20220518" href="https://access.redhat.com/security/cve/CVE-2022-1920" impact="Moderate" cwe="CWE-190-&gt;CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1920</cve>
          <cve public="20220517" href="https://access.redhat.com/security/cve/CVE-2022-1921" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1921</cve>
          <cve public="20220518" href="https://access.redhat.com/security/cve/CVE-2022-1922" impact="Moderate" cwe="CWE-190-&gt;CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1922</cve>
          <cve public="20220518" href="https://access.redhat.com/security/cve/CVE-2022-1923" impact="Moderate" cwe="CWE-190-&gt;CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1923</cve>
          <cve public="20220518" href="https://access.redhat.com/security/cve/CVE-2022-1924" impact="Moderate" cwe="CWE-190-&gt;CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1924</cve>
          <cve public="20220518" href="https://access.redhat.com/security/cve/CVE-2022-1925" impact="Moderate" cwe="CWE-190-&gt;CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-1925</cve>
          <cve public="20220518" href="https://access.redhat.com/security/cve/CVE-2022-2122" impact="Moderate" cwe="CWE-190-&gt;CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-2122</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232260001" comment="gstreamer1-plugins-good is earlier than 0:1.18.4-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232260002" comment="gstreamer1-plugins-good is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232260003" comment="gstreamer1-plugins-good-gtk is earlier than 0:1.18.4-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232260004" comment="gstreamer1-plugins-good-gtk is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232261" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2261: bind security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2261" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2261"/>
        <reference ref_id="CVE-2022-2795" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2795"/>
        <reference ref_id="CVE-2022-3094" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3094"/>
        <reference ref_id="CVE-2022-3736" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3736"/>
        <reference ref_id="CVE-2022-3924" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3924"/>
        <reference ref_id="ALSA-2023:2261" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2261.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: processing large delegations may severely degrade resolver performance (CVE-2022-2795)
* bind: flooding with UPDATE requests may lead to DoS (CVE-2022-3094)
* bind: sending specific queries to the resolver may cause a DoS (CVE-2022-3736)
* bind: sending specific queries to the resolver may cause a DoS (CVE-2022-3924)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2128584" id="2128584"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164032" id="2164032"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164038" id="2164038"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2164039" id="2164039"></bugzilla>
          <cve public="20220921" href="https://access.redhat.com/security/cve/CVE-2022-2795" impact="Moderate" cwe="CWE-20-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-2795</cve>
          <cve public="20230125" href="https://access.redhat.com/security/cve/CVE-2022-3094" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3094</cve>
          <cve public="20230125" href="https://access.redhat.com/security/cve/CVE-2022-3736" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3736</cve>
          <cve public="20230125" href="https://access.redhat.com/security/cve/CVE-2022-3924" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3924</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261001" comment="bind is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261003" comment="bind-chroot is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261020" comment="bind-devel is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261009" comment="bind-dnssec-utils is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261021" comment="bind-libs is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261017" comment="bind-utils is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261007" comment="bind-dnssec-doc is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261011" comment="bind-doc is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068012" comment="bind-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261015" comment="bind-license is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232261019" comment="python3-bind is earlier than 32:9.16.23-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232282" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:2282: podman security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2282" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2282"/>
        <reference ref_id="CVE-2022-30629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30629"/>
        <reference ref_id="CVE-2022-41717" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41717"/>
        <reference ref_id="ALSA-2023:2282" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2282.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2092793" id="2092793"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2161274" id="2161274"></bugzilla>
          <cve public="20220602" href="https://access.redhat.com/security/cve/CVE-2022-30629" impact="Low" cwe="CWE-331" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N">CVE-2022-30629</cve>
          <cve public="20221130" href="https://access.redhat.com/security/cve/CVE-2022-41717" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-41717</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232282001" comment="podman is earlier than 2:4.4.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232282005" comment="podman-gvproxy is earlier than 2:4.4.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954006" comment="podman-gvproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232282007" comment="podman-plugins is earlier than 2:4.4.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232282009" comment="podman-remote is earlier than 2:4.4.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232282011" comment="podman-tests is earlier than 2:4.4.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232282003" comment="podman-docker is earlier than 2:4.4.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232293" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:2293: pki-core security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2293" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2293"/>
        <reference ref_id="CVE-2022-2393" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2393"/>
        <reference ref_id="ALSA-2023:2293" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2293.html"/>
        <description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System.

Security Fix(es):

* pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (CVE-2022-2393)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2101046" id="2101046"></bugzilla>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-2393" impact="Moderate" cwe="CWE-287" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N">CVE-2022-2393</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293015" comment="idm-pki-tools is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293016" comment="idm-pki-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293001" comment="idm-pki-acme is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293002" comment="idm-pki-acme is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293003" comment="idm-pki-base is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293004" comment="idm-pki-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293005" comment="idm-pki-ca is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293006" comment="idm-pki-ca is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293007" comment="idm-pki-est is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293008" comment="idm-pki-est is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293009" comment="idm-pki-java is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293010" comment="idm-pki-java is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293011" comment="idm-pki-kra is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293012" comment="idm-pki-kra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293013" comment="idm-pki-server is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293014" comment="idm-pki-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293017" comment="python3-idm-pki is earlier than 0:11.3.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293018" comment="python3-idm-pki is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232319" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2319: git security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2319" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2319"/>
        <reference ref_id="CVE-2022-24765" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24765"/>
        <reference ref_id="CVE-2022-29187" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-29187"/>
        <reference ref_id="CVE-2022-39253" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39253"/>
        <reference ref_id="CVE-2022-39260" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39260"/>
        <reference ref_id="ALSA-2023:2319" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2319.html"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree (CVE-2022-24765)
* git: Bypass of safe.directory protections (CVE-2022-29187)
* git: exposure of sensitive information to a malicious actor (CVE-2022-39253)
* git: git shell function that splits command arguments can lead to arbitrary heap writes. (CVE-2022-39260)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2073414" id="2073414"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107439" id="2107439"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2137422" id="2137422"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2137423" id="2137423"></bugzilla>
          <cve public="20220412" href="https://access.redhat.com/security/cve/CVE-2022-24765" impact="Moderate" cwe="CWE-427" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-24765</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-29187" impact="Moderate" cwe="(CWE-282|CWE-427)" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-29187</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39253" impact="Moderate" cwe="CWE-59" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2022-39253</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39260" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-39260</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319001" comment="git is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611002" comment="git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319005" comment="git-core is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611006" comment="git-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319009" comment="git-credential-libsecret is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611010" comment="git-credential-libsecret is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319011" comment="git-daemon is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611012" comment="git-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319019" comment="git-subtree is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611020" comment="git-subtree is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319003" comment="git-all is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611004" comment="git-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319007" comment="git-core-doc is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611008" comment="git-core-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319013" comment="git-email is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611014" comment="git-email is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319015" comment="git-gui is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611016" comment="git-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319017" comment="git-instaweb is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611018" comment="git-instaweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319021" comment="git-svn is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611022" comment="git-svn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319023" comment="gitk is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611024" comment="gitk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319025" comment="gitweb is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611026" comment="gitweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319027" comment="perl-Git is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611028" comment="perl-Git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232319029" comment="perl-Git-SVN is earlier than 0:2.39.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611030" comment="perl-Git-SVN is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232326" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2326: freerdp security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2326" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2326"/>
        <reference ref_id="CVE-2022-39282" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39282"/>
        <reference ref_id="CVE-2022-39283" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39283"/>
        <reference ref_id="CVE-2022-39316" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39316"/>
        <reference ref_id="CVE-2022-39317" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39317"/>
        <reference ref_id="CVE-2022-39318" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39318"/>
        <reference ref_id="CVE-2022-39319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39319"/>
        <reference ref_id="CVE-2022-39320" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39320"/>
        <reference ref_id="CVE-2022-39347" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39347"/>
        <reference ref_id="CVE-2022-41877" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41877"/>
        <reference ref_id="ALSA-2023:2326" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2326.html"/>
        <description>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: clients using `/parallel` command line switch might read uninitialized data (CVE-2022-39282)
* freerdp: clients using the `/video` command line switch might read uninitialized data (CVE-2022-39283)
* freerdp: out of bounds read in zgfx decoder (CVE-2022-39316)
* freerdp: undefined behaviour in zgfx decoder (CVE-2022-39317)
* freerdp: division by zero in urbdrc channel (CVE-2022-39318)
* freerdp: missing length validation in urbdrc channel (CVE-2022-39319)
* freerdp: heap buffer overflow in urbdrc channel (CVE-2022-39320)
* freerdp: missing path sanitation with `drive` channel (CVE-2022-39347)
* freerdp: missing input length validation in `drive` channel (CVE-2022-41877)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2134713" id="2134713"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134717" id="2134717"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143642" id="2143642"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143643" id="2143643"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143644" id="2143644"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143645" id="2143645"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143646" id="2143646"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143647" id="2143647"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143648" id="2143648"></bugzilla>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-39282" impact="Moderate" cwe="CWE-908" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-39282</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-39283" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-39283</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-39316" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2022-39316</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-39317" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L">CVE-2022-39317</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-39318" impact="Low" cwe="CWE-20-&gt;CWE-369" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2022-39318</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-39319" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L">CVE-2022-39319</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-39320" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L">CVE-2022-39320</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-39347" impact="Low" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N">CVE-2022-39347</cve>
          <cve public="20221116" href="https://access.redhat.com/security/cve/CVE-2022-41877" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L">CVE-2022-41877</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326001" comment="freerdp is earlier than 2:2.4.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326002" comment="freerdp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326011" comment="freerdp-devel is earlier than 2:2.4.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326004" comment="freerdp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326012" comment="freerdp-libs is earlier than 2:2.4.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326006" comment="freerdp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326013" comment="libwinpr is earlier than 2:2.4.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326008" comment="libwinpr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326014" comment="libwinpr-devel is earlier than 2:2.4.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326010" comment="libwinpr-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232366" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2366: emacs security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2366" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2366"/>
        <reference ref_id="CVE-2022-45939" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45939"/>
        <reference ref_id="ALSA-2023:2366" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2366.html"/>
        <description>GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.

Security Fix(es):

* emacs: ctags local command execution vulnerability (CVE-2022-45939)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2149380" id="2149380"></bugzilla>
          <cve public="20221127" href="https://access.redhat.com/security/cve/CVE-2022-45939" impact="Moderate" cwe="CWE-78" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-45939</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232366001" comment="emacs is earlier than 1:27.2-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074002" comment="emacs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232366003" comment="emacs-common is earlier than 1:27.2-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074004" comment="emacs-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232366007" comment="emacs-lucid is earlier than 1:27.2-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074008" comment="emacs-lucid is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232366009" comment="emacs-nox is earlier than 1:27.2-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074010" comment="emacs-nox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232366005" comment="emacs-filesystem is earlier than 1:27.2-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074006" comment="emacs-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232370" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:2370: unbound security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2370" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2370"/>
        <reference ref_id="CVE-2022-3204" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3204"/>
        <reference ref_id="ALSA-2023:2370" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2370.html"/>
        <description>The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. 

Security Fix(es):

* unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack) (CVE-2022-3204)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2128947" id="2128947"></bugzilla>
          <cve public="20220921" href="https://access.redhat.com/security/cve/CVE-2022-3204" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3204</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232370001" comment="python3-unbound is earlier than 0:1.16.2-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062002" comment="python3-unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232370003" comment="unbound is earlier than 0:1.16.2-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062004" comment="unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232370008" comment="unbound-devel is earlier than 0:1.16.2-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062006" comment="unbound-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232370009" comment="unbound-libs is earlier than 0:1.16.2-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062008" comment="unbound-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232373" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2373: wireshark security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2373" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2373"/>
        <reference ref_id="CVE-2022-3190" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3190"/>
        <reference ref_id="ALSA-2023:2373" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2373.html"/>
        <description>The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.

Security Fix(es):

* wireshark: f5ethtrailer Infinite loop in legacy style dissector (CVE-2022-3190)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2152061" id="2152061"></bugzilla>
          <cve public="20220913" href="https://access.redhat.com/security/cve/CVE-2022-3190" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-3190</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373001" comment="wireshark is earlier than 1:3.4.10-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373002" comment="wireshark is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373007" comment="wireshark-cli is earlier than 1:3.4.10-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373004" comment="wireshark-cli is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373008" comment="wireshark-devel is earlier than 1:3.4.10-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373006" comment="wireshark-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232417" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:2417: php:8.1 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2417" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2417"/>
        <reference ref_id="CVE-2022-31628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31628"/>
        <reference ref_id="CVE-2022-31629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31629"/>
        <reference ref_id="CVE-2022-31630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31630"/>
        <reference ref_id="CVE-2022-31631" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-31631"/>
        <reference ref_id="CVE-2022-37454" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-37454"/>
        <reference ref_id="ALSA-2023:2417" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2417.html"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

The following packages have been upgraded to a later upstream version: php (8.1.14).

Security Fix(es):

* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
* php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications (CVE-2022-31629)
* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
* php: PDO::quote() may return unquoted string due to an integer overflow (CVE-2022-31631)
* php: phar: infinite loop when decompressing quine gzip file (CVE-2022-31628)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2133687" id="2133687"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133688" id="2133688"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2139280" id="2139280"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2140200" id="2140200"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2158791" id="2158791"></bugzilla>
          <cve public="20220929" href="https://access.redhat.com/security/cve/CVE-2022-31628" impact="Low" cwe="CWE-674" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-31628</cve>
          <cve public="20220929" href="https://access.redhat.com/security/cve/CVE-2022-31629" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2022-31629</cve>
          <cve public="20221027" href="https://access.redhat.com/security/cve/CVE-2022-31630" impact="Moderate" cwe="CWE-20-&gt;CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L">CVE-2022-31630</cve>
          <cve public="20230105" href="https://access.redhat.com/security/cve/CVE-2022-31631" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-31631</cve>
          <cve public="20221020" href="https://access.redhat.com/security/cve/CVE-2022-37454" impact="Important" cwe="CWE-680" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-37454</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232417063" comment="Module php:8.1 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417064" comment="php is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904002" comment="php is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417065" comment="php-bcmath is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904004" comment="php-bcmath is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417066" comment="php-cli is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904006" comment="php-cli is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417067" comment="php-common is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904008" comment="php-common is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417068" comment="php-dba is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904010" comment="php-dba is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417069" comment="php-dbg is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904012" comment="php-dbg is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417070" comment="php-devel is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904014" comment="php-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417071" comment="php-embedded is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904016" comment="php-embedded is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417072" comment="php-enchant is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904018" comment="php-enchant is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417073" comment="php-ffi is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904020" comment="php-ffi is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417074" comment="php-fpm is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904022" comment="php-fpm is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417075" comment="php-gd is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904024" comment="php-gd is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417076" comment="php-gmp is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904026" comment="php-gmp is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417077" comment="php-intl is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904028" comment="php-intl is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417078" comment="php-ldap is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904030" comment="php-ldap is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417079" comment="php-mbstring is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904032" comment="php-mbstring is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417080" comment="php-mysqlnd is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904034" comment="php-mysqlnd is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417081" comment="php-odbc is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904036" comment="php-odbc is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417082" comment="php-opcache is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904038" comment="php-opcache is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417083" comment="php-pdo is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904040" comment="php-pdo is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387082" comment="php-pecl-apcu is earlier than 0:5.1.21-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417044" comment="php-pecl-apcu is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387083" comment="php-pecl-apcu-devel is earlier than 0:5.1.21-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417046" comment="php-pecl-apcu-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387084" comment="php-pecl-rrd is earlier than 0:2.0.3-4.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417048" comment="php-pecl-rrd is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387085" comment="php-pecl-xdebug3 is earlier than 0:3.1.4-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417050" comment="php-pecl-xdebug3 is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387086" comment="php-pecl-zip is earlier than 0:1.20.1-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417052" comment="php-pecl-zip is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417084" comment="php-pgsql is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904042" comment="php-pgsql is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417085" comment="php-process is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904044" comment="php-process is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417086" comment="php-snmp is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904046" comment="php-snmp is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417087" comment="php-soap is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904048" comment="php-soap is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417088" comment="php-xml is earlier than 0:8.1.14-1.module_el9.2.0+24+ca6bd7c2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904050" comment="php-xml is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387092" comment="apcu-panel is earlier than 0:5.1.21-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417002" comment="apcu-panel is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232444" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2444: net-snmp security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2444" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2444"/>
        <reference ref_id="CVE-2022-44792" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-44792"/>
        <reference ref_id="CVE-2022-44793" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-44793"/>
        <reference ref_id="ALSA-2023:2444" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2444.html"/>
        <description>The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.

Security Fix(es):

* net-snmp: NULL Pointer Exception when handling ipDefaultTTL (CVE-2022-44792)
* net-snmp: NULL Pointer Exception when handling pv6IpForwarding (CVE-2022-44793)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2141897" id="2141897"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2141898" id="2141898"></bugzilla>
          <cve public="20221107" href="https://access.redhat.com/security/cve/CVE-2022-44792" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-44792</cve>
          <cve public="20221107" href="https://access.redhat.com/security/cve/CVE-2022-44793" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-44793</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444001" comment="net-snmp is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444002" comment="net-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444015" comment="net-snmp-agent-libs is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444004" comment="net-snmp-agent-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444016" comment="net-snmp-devel is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444006" comment="net-snmp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444017" comment="net-snmp-libs is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444008" comment="net-snmp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444009" comment="net-snmp-perl is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444010" comment="net-snmp-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444011" comment="net-snmp-utils is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444012" comment="net-snmp-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444013" comment="python3-net-snmp is earlier than 1:5.9.1-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232444014" comment="python3-net-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232458" version="644" class="patch">
      <metadata>
        <title>ALSA-2023:2458: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:2458" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2458"/>
        <reference ref_id="CVE-2021-26341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-26341"/>
        <reference ref_id="CVE-2021-33655" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-33655"/>
        <reference ref_id="CVE-2022-1462" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1462"/>
        <reference ref_id="CVE-2022-1789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1789"/>
        <reference ref_id="CVE-2022-1882" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-1882"/>
        <reference ref_id="CVE-2022-20141" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-20141"/>
        <reference ref_id="CVE-2022-21505" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21505"/>
        <reference ref_id="CVE-2022-2196" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2196"/>
        <reference ref_id="CVE-2022-2663" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2663"/>
        <reference ref_id="CVE-2022-28388" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-28388"/>
        <reference ref_id="CVE-2022-3028" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3028"/>
        <reference ref_id="CVE-2022-33743" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-33743"/>
        <reference ref_id="CVE-2022-3435" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3435"/>
        <reference ref_id="CVE-2022-3522" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3522"/>
        <reference ref_id="CVE-2022-3524" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3524"/>
        <reference ref_id="CVE-2022-3566" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3566"/>
        <reference ref_id="CVE-2022-3567" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3567"/>
        <reference ref_id="CVE-2022-3619" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3619"/>
        <reference ref_id="CVE-2022-3623" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3623"/>
        <reference ref_id="CVE-2022-3625" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3625"/>
        <reference ref_id="CVE-2022-3628" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3628"/>
        <reference ref_id="CVE-2022-3640" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3640"/>
        <reference ref_id="CVE-2022-3707" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3707"/>
        <reference ref_id="CVE-2022-39188" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39188"/>
        <reference ref_id="CVE-2022-39189" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39189"/>
        <reference ref_id="CVE-2022-4128" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4128"/>
        <reference ref_id="CVE-2022-4129" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4129"/>
        <reference ref_id="CVE-2022-41674" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41674"/>
        <reference ref_id="CVE-2022-42703" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42703"/>
        <reference ref_id="CVE-2022-42720" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42720"/>
        <reference ref_id="CVE-2022-42721" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42721"/>
        <reference ref_id="CVE-2022-42722" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42722"/>
        <reference ref_id="CVE-2022-42896" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-42896"/>
        <reference ref_id="CVE-2022-43750" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43750"/>
        <reference ref_id="CVE-2022-47929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-47929"/>
        <reference ref_id="CVE-2023-0394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0394"/>
        <reference ref_id="CVE-2023-0461" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0461"/>
        <reference ref_id="CVE-2023-0590" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0590"/>
        <reference ref_id="CVE-2023-1195" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1195"/>
        <reference ref_id="CVE-2023-1382" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1382"/>
        <reference ref_id="ALSA-2023:2458" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2458.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)
* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)
* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
* memory leak in ipv6_renew_options() (CVE-2022-3524)
* data races around icsk-&gt;icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
* data races around sk-&gt;sk_prot (CVE-2022-3567)
* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)
* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
* lockdown bypass using IMA (CVE-2022-21505)
* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)
* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
* Denial of service in beacon protection for P2P-device (CVE-2022-42722)
* memory corruption in usbmon driver (CVE-2022-43750)
* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)
* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
* denial of service in tipc_conn_close (CVE-2023-1382)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2061703" id="2061703"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2073091" id="2073091"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2078466" id="2078466"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2089701" id="2089701"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2090723" id="2090723"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106830" id="2106830"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107924" id="2107924"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2108691" id="2108691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2114937" id="2114937"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2122228" id="2122228"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2123056" id="2123056"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2124788" id="2124788"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130141" id="2130141"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133483" id="2133483"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133490" id="2133490"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134377" id="2134377"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134380" id="2134380"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134451" id="2134451"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134506" id="2134506"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134517" id="2134517"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2134528" id="2134528"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2137979" id="2137979"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2139610" id="2139610"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143893" id="2143893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2143943" id="2143943"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2144720" id="2144720"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2147364" id="2147364"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150947" id="2150947"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150960" id="2150960"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2150979" id="2150979"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151270" id="2151270"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2154171" id="2154171"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2154235" id="2154235"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2160023" id="2160023"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162120" id="2162120"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2165721" id="2165721"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2165741" id="2165741"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2168246" id="2168246"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2176192" id="2176192"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2177371" id="2177371"></bugzilla>
          <cve public="20220308" href="https://access.redhat.com/security/cve/CVE-2021-26341" impact="Moderate" cwe="CWE-668-&gt;CWE-552" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2021-26341</cve>
          <cve public="20220708" href="https://access.redhat.com/security/cve/CVE-2021-33655" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2021-33655</cve>
          <cve public="20220509" href="https://access.redhat.com/security/cve/CVE-2022-1462" impact="Moderate" cwe="CWE-362-&gt;CWE-366" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2022-1462</cve>
          <cve public="20220525" href="https://access.redhat.com/security/cve/CVE-2022-1789" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H">CVE-2022-1789</cve>
          <cve public="20220507" href="https://access.redhat.com/security/cve/CVE-2022-1882" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-1882</cve>
          <cve public="20210716" href="https://access.redhat.com/security/cve/CVE-2022-20141" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-20141</cve>
          <cve public="20220719" href="https://access.redhat.com/security/cve/CVE-2022-21505" impact="Moderate" cwe="CWE-305" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-21505</cve>
          <cve public="20220928" href="https://access.redhat.com/security/cve/CVE-2022-2196" impact="Moderate" cwe="CWE-1188" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2022-2196</cve>
          <cve public="20220830" href="https://access.redhat.com/security/cve/CVE-2022-2663" impact="Moderate" cwe="CWE-923" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2022-2663</cve>
          <cve public="20220404" href="https://access.redhat.com/security/cve/CVE-2022-28388" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-28388</cve>
          <cve public="20220721" href="https://access.redhat.com/security/cve/CVE-2022-3028" impact="Moderate" cwe="CWE-667-&gt;CWE-362-&gt;(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3028</cve>
          <cve public="20220704" href="https://access.redhat.com/security/cve/CVE-2022-33743" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-33743</cve>
          <cve public="20221008" href="https://access.redhat.com/security/cve/CVE-2022-3435" impact="Moderate" cwe="(CWE-119|CWE-125)" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-3435</cve>
          <cve public="20221012" href="https://access.redhat.com/security/cve/CVE-2022-3522" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3522</cve>
          <cve public="20221012" href="https://access.redhat.com/security/cve/CVE-2022-3524" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3524</cve>
          <cve public="20221006" href="https://access.redhat.com/security/cve/CVE-2022-3566" impact="Moderate" cwe="CWE-366" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L">CVE-2022-3566</cve>
          <cve public="20221006" href="https://access.redhat.com/security/cve/CVE-2022-3567" impact="Moderate" cwe="CWE-421" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2022-3567</cve>
          <cve public="20221020" href="https://access.redhat.com/security/cve/CVE-2022-3619" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-3619</cve>
          <cve public="20220901" href="https://access.redhat.com/security/cve/CVE-2022-3623" impact="Moderate" cwe="CWE-123" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2022-3623</cve>
          <cve public="20220809" href="https://access.redhat.com/security/cve/CVE-2022-3625" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3625</cve>
          <cve public="20221022" href="https://access.redhat.com/security/cve/CVE-2022-3628" impact="Moderate" cwe="CWE-119-&gt;CWE-120" cvss3="CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-3628</cve>
          <cve public="20221017" href="https://access.redhat.com/security/cve/CVE-2022-3640" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-3640</cve>
          <cve public="20221007" href="https://access.redhat.com/security/cve/CVE-2022-3707" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3707</cve>
          <cve public="20220706" href="https://access.redhat.com/security/cve/CVE-2022-39188" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39188</cve>
          <cve public="20220530" href="https://access.redhat.com/security/cve/CVE-2022-39189" impact="Moderate" cwe="CWE-440-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-39189</cve>
          <cve public="20220711" href="https://access.redhat.com/security/cve/CVE-2022-4128" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4128</cve>
          <cve public="20220810" href="https://access.redhat.com/security/cve/CVE-2022-4129" impact="Moderate" cwe="CWE-667-&gt;CWE-362-&gt;CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4129</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-41674" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2022-41674</cve>
          <cve public="20221009" href="https://access.redhat.com/security/cve/CVE-2022-42703" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42703</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-42720" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2022-42720</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-42721" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42721</cve>
          <cve public="20221013" href="https://access.redhat.com/security/cve/CVE-2022-42722" impact="Moderate" cwe="CWE-705" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-42722</cve>
          <cve public="20221103" href="https://access.redhat.com/security/cve/CVE-2022-42896" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2022-42896</cve>
          <cve public="20220922" href="https://access.redhat.com/security/cve/CVE-2022-43750" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2022-43750</cve>
          <cve public="20230109" href="https://access.redhat.com/security/cve/CVE-2022-47929" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H">CVE-2022-47929</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-0394" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0394</cve>
          <cve public="20230223" href="https://access.redhat.com/security/cve/CVE-2023-0461" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0461</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2023-0590" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-0590</cve>
          <cve public="20221002" href="https://access.redhat.com/security/cve/CVE-2023-1195" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-1195</cve>
          <cve public="20221118" href="https://access.redhat.com/security/cve/CVE-2023-1382" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-1382</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458001" comment="bpftool is earlier than 0:7.0.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458003" comment="kernel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458097" comment="kernel-64k is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458098" comment="kernel-64k-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458099" comment="kernel-64k-debug is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458100" comment="kernel-64k-debug-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458101" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458102" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458103" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458104" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458105" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458106" comment="kernel-64k-devel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458107" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458108" comment="kernel-64k-modules is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458109" comment="kernel-64k-modules-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458110" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458035" comment="kernel-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458037" comment="kernel-cross-headers is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458039" comment="kernel-debug is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458041" comment="kernel-debug-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458043" comment="kernel-debug-devel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458045" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458047" comment="kernel-debug-modules is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458049" comment="kernel-debug-modules-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458051" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458111" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458055" comment="kernel-devel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458057" comment="kernel-devel-matched is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458061" comment="kernel-modules is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458063" comment="kernel-modules-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458065" comment="kernel-modules-extra is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458067" comment="kernel-tools is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458112" comment="kernel-tools-libs is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458113" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458114" comment="kernel-uki-virt is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458115" comment="kernel-zfcpdump is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458116" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458117" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458118" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458119" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458120" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458121" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458089" comment="perf is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458091" comment="python3-perf is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458093" comment="rtla is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458033" comment="kernel-abi-stablelists is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458059" comment="kernel-doc is earlier than 0:5.14.0-284.11.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232459" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:2459: device-mapper-multipath security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2459" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2459"/>
        <reference ref_id="CVE-2022-41973" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41973"/>
        <reference ref_id="ALSA-2023:2459" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2459.html"/>
        <description>The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.

Security Fix(es):

* device-mapper-multipath: multipathd: insecure handling of files in /dev/shm leading to symlink attack (CVE-2022-41973)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2123894" id="2123894"></bugzilla>
          <cve public="20221024" href="https://access.redhat.com/security/cve/CVE-2022-41973" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2022-41973</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232459001" comment="device-mapper-multipath is earlier than 0:0.8.7-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185002" comment="device-mapper-multipath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232459009" comment="device-mapper-multipath-devel is earlier than 0:0.8.7-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185004" comment="device-mapper-multipath-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232459010" comment="device-mapper-multipath-libs is earlier than 0:0.8.7-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185006" comment="device-mapper-multipath-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232459011" comment="kpartx is earlier than 0:0.8.7-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227185008" comment="kpartx is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232478" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2478: curl security update (Low)</title>
        <reference ref_id="RHSA-2023:2478" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2478"/>
        <reference ref_id="CVE-2022-35252" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-35252"/>
        <reference ref_id="CVE-2022-43552" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-43552"/>
        <reference ref_id="ALSA-2023:2478" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2478.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: Incorrect handling of control code characters in cookies (CVE-2022-35252)
* curl: Use-after-free triggered by an HTTP proxy deny response (CVE-2022-43552)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2120718" id="2120718"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2152652" id="2152652"></bugzilla>
          <cve public="20220831" href="https://access.redhat.com/security/cve/CVE-2022-35252" impact="Low" cwe="CWE-1286" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2022-35252</cve>
          <cve public="20221221" href="https://access.redhat.com/security/cve/CVE-2022-43552" impact="Low" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-43552</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232478001" comment="curl is earlier than 0:7.76.1-23.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232478003" comment="curl-minimal is earlier than 0:7.76.1-23.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232478010" comment="libcurl is earlier than 0:7.76.1-23.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232478011" comment="libcurl-devel is earlier than 0:7.76.1-23.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232478012" comment="libcurl-minimal is earlier than 0:7.76.1-23.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232487" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2487: fwupd security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:2487" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2487"/>
        <reference ref_id="CVE-2022-3287" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3287"/>
        <reference ref_id="CVE-2022-34301" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34301"/>
        <reference ref_id="CVE-2022-34302" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34302"/>
        <reference ref_id="CVE-2022-34303" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-34303"/>
        <reference ref_id="ALSA-2023:2487" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2487.html"/>
        <description>The fwupd packages provide a service that allows session software to update device firmware.

Security Fix(es):

* fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287)
* shim: 3rd party shim allow secure boot bypass (CVE-2022-34301)
* shim: 3rd party shim allow secure boot bypass (CVE-2022-34302)
* shim: 3rd party shim allow secure boot bypass (CVE-2022-34303)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2120687" id="2120687"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2120699" id="2120699"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2120701" id="2120701"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2129904" id="2129904"></bugzilla>
          <cve public="20220922" href="https://access.redhat.com/security/cve/CVE-2022-3287" impact="Moderate" cwe="(CWE-256|CWE-552)" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2022-3287</cve>
          <cve public="20220811" href="https://access.redhat.com/security/cve/CVE-2022-34301" impact="Moderate" cwe="CWE-494" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H">CVE-2022-34301</cve>
          <cve public="20220811" href="https://access.redhat.com/security/cve/CVE-2022-34302" impact="Moderate" cwe="CWE-494" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2022-34302</cve>
          <cve public="20220811" href="https://access.redhat.com/security/cve/CVE-2022-34303" impact="Moderate" cwe="CWE-494" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H">CVE-2022-34303</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232487007" comment="fwupd is earlier than 0:1.8.10-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232487002" comment="fwupd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232487008" comment="fwupd-devel is earlier than 0:1.8.10-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232487004" comment="fwupd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232487009" comment="fwupd-plugin-flashrom is earlier than 0:1.8.10-2.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232487006" comment="fwupd-plugin-flashrom is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232502" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2502: dhcp security and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2502" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2502"/>
        <reference ref_id="CVE-2022-2928" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2928"/>
        <reference ref_id="CVE-2022-2929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2929"/>
        <reference ref_id="ALSA-2023:2502" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2502.html"/>
        <description>The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.

Security Fix(es):

* dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort (CVE-2022-2928)
* dhcp: DHCP memory leak (CVE-2022-2929)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2132001" id="2132001"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2132002" id="2132002"></bugzilla>
          <cve public="20221005" href="https://access.redhat.com/security/cve/CVE-2022-2928" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2928</cve>
          <cve public="20221005" href="https://access.redhat.com/security/cve/CVE-2022-2929" impact="Moderate" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2929</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232502001" comment="dhcp-client is earlier than 12:4.4.2-18.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385002" comment="dhcp-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232502005" comment="dhcp-relay is earlier than 12:4.4.2-18.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385006" comment="dhcp-relay is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232502007" comment="dhcp-server is earlier than 12:4.4.2-18.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385008" comment="dhcp-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232502003" comment="dhcp-common is earlier than 12:4.4.2-18.b1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228385004" comment="dhcp-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232523" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2523: openssl security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2023:2523" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2523"/>
        <reference ref_id="CVE-2022-3358" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3358"/>
        <reference ref_id="ALSA-2023:2523" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2523.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: Using a Custom Cipher with NID_undef may lead to NULL encryption (CVE-2022-3358)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2134740" id="2134740"></bugzilla>
          <cve public="20221011" href="https://access.redhat.com/security/cve/CVE-2022-3358" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2022-3358</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232523001" comment="openssl is earlier than 1:3.0.7-6.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232523008" comment="openssl-devel is earlier than 1:3.0.7-6.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232523009" comment="openssl-libs is earlier than 1:3.0.7-6.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232523007" comment="openssl-perl is earlier than 1:3.0.7-6.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232532" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2532: libarchive security update (Low)</title>
        <reference ref_id="RHSA-2023:2532" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2532"/>
        <reference ref_id="CVE-2022-36227" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36227"/>
        <reference ref_id="ALSA-2023:2532" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2532.html"/>
        <description>The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.

Security Fix(es):

* libarchive: NULL pointer dereference in archive_write.c (CVE-2022-36227)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2144972" id="2144972"></bugzilla>
          <cve public="20220711" href="https://access.redhat.com/security/cve/CVE-2022-36227" impact="Low" cwe="CWE-252-&gt;CWE-476" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-36227</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232532001" comment="bsdtar is earlier than 0:3.5.3-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252002" comment="bsdtar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232532006" comment="libarchive is earlier than 0:3.5.3-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252004" comment="libarchive is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232532007" comment="libarchive-devel is earlier than 0:3.5.3-4.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225252006" comment="libarchive-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232570" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2570: krb5 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2570" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2570"/>
        <reference ref_id="CVE-2020-17049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-17049"/>
        <reference ref_id="ALSA-2023:2570" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2570.html"/>
        <description>Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

The following packages have been upgraded to a later upstream version: krb5 (1.20.1). (BZ#2016312)

Security Fix(es):

* Kerberos: delegation constrain bypass in S4U2Proxy (CVE-2020-17049)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2025721" id="2025721"></bugzilla>
          <cve public="20201110" href="https://access.redhat.com/security/cve/CVE-2020-17049" impact="Moderate" cwe="CWE-345" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2020-17049</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570001" comment="krb5-devel is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637002" comment="krb5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570003" comment="krb5-libs is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637004" comment="krb5-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570005" comment="krb5-pkinit is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637006" comment="krb5-pkinit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570007" comment="krb5-server is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637008" comment="krb5-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570009" comment="krb5-server-ldap is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637010" comment="krb5-server-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570014" comment="krb5-workstation is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637012" comment="krb5-workstation is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232570013" comment="libkadm5 is earlier than 0:1.20.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637014" comment="libkadm5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232621" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2621: mysql security update (Important)</title>
        <reference ref_id="RHSA-2023:2621" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2621"/>
        <reference ref_id="CVE-2022-21594" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21594"/>
        <reference ref_id="CVE-2022-21599" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21599"/>
        <reference ref_id="CVE-2022-21604" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21604"/>
        <reference ref_id="CVE-2022-21608" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21608"/>
        <reference ref_id="CVE-2022-21611" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21611"/>
        <reference ref_id="CVE-2022-21617" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21617"/>
        <reference ref_id="CVE-2022-21625" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21625"/>
        <reference ref_id="CVE-2022-21632" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21632"/>
        <reference ref_id="CVE-2022-21633" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21633"/>
        <reference ref_id="CVE-2022-21637" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21637"/>
        <reference ref_id="CVE-2022-21640" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-21640"/>
        <reference ref_id="CVE-2022-39400" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39400"/>
        <reference ref_id="CVE-2022-39408" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39408"/>
        <reference ref_id="CVE-2022-39410" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-39410"/>
        <reference ref_id="CVE-2023-21836" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21836"/>
        <reference ref_id="CVE-2023-21863" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21863"/>
        <reference ref_id="CVE-2023-21864" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21864"/>
        <reference ref_id="CVE-2023-21865" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21865"/>
        <reference ref_id="CVE-2023-21867" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21867"/>
        <reference ref_id="CVE-2023-21868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21868"/>
        <reference ref_id="CVE-2023-21869" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21869"/>
        <reference ref_id="CVE-2023-21870" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21870"/>
        <reference ref_id="CVE-2023-21871" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21871"/>
        <reference ref_id="CVE-2023-21873" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21873"/>
        <reference ref_id="CVE-2023-21874" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21874"/>
        <reference ref_id="CVE-2023-21875" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21875"/>
        <reference ref_id="CVE-2023-21876" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21876"/>
        <reference ref_id="CVE-2023-21877" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21877"/>
        <reference ref_id="CVE-2023-21878" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21878"/>
        <reference ref_id="CVE-2023-21879" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21879"/>
        <reference ref_id="CVE-2023-21880" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21880"/>
        <reference ref_id="CVE-2023-21881" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21881"/>
        <reference ref_id="CVE-2023-21882" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21882"/>
        <reference ref_id="CVE-2023-21883" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21883"/>
        <reference ref_id="CVE-2023-21887" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21887"/>
        <reference ref_id="CVE-2023-21912" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21912"/>
        <reference ref_id="CVE-2023-21917" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21917"/>
        <reference ref_id="ALSA-2023:2621" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2621.html"/>
        <description>MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

The following packages have been upgraded to a later upstream version: mysql (8.0.32). (BZ#2177731, BZ#2177732)

Security Fix(es):

* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023) (CVE-2023-21912)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21594)
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022) (CVE-2022-21599)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21604)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21608)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21611)
* mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) (CVE-2022-21617)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21625)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) (CVE-2022-21632)
* mysql: Server: Replication unspecified vulnerability (CPU Oct 2022) (CVE-2022-21633)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2022) (CVE-2022-21637)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-21640)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-39400)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-39408)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) (CVE-2022-39410)
* mysql: Server: DML unspecified vulnerability (CPU Jan 2023) (CVE-2023-21836)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21863)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21864)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21865)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21867)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21868)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21869)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21870)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21871)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21873)
* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023) (CVE-2023-21875)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21876)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21877)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21878)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21879)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2023) (CVE-2023-21880)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21881)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21883)
* mysql: Server: GIS unspecified vulnerability (CPU Jan 2023) (CVE-2023-21887)
* mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) (CVE-2023-21917)
* mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023) (CVE-2023-21874)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) (CVE-2023-21882)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2142861" id="2142861"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142863" id="2142863"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142865" id="2142865"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142868" id="2142868"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142869" id="2142869"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142870" id="2142870"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142871" id="2142871"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142872" id="2142872"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142873" id="2142873"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142875" id="2142875"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142877" id="2142877"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142879" id="2142879"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142880" id="2142880"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2142881" id="2142881"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162268" id="2162268"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162270" id="2162270"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162271" id="2162271"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162272" id="2162272"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162274" id="2162274"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162275" id="2162275"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162276" id="2162276"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162277" id="2162277"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162278" id="2162278"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162280" id="2162280"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162281" id="2162281"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162282" id="2162282"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162283" id="2162283"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162284" id="2162284"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162285" id="2162285"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162286" id="2162286"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162287" id="2162287"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162288" id="2162288"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162289" id="2162289"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162290" id="2162290"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2162291" id="2162291"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188110" id="2188110"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188112" id="2188112"></bugzilla>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21594" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21594</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21599" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21599</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21604" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21604</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21608" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21608</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21611" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21611</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21617" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21617</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21625" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21625</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21632" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21632</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21633" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21633</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21637" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21637</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-21640" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-21640</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39400" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39400</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39408" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39408</cve>
          <cve public="20221018" href="https://access.redhat.com/security/cve/CVE-2022-39410" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-39410</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21836" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21836</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21863" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21863</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21864" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21864</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21865" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21865</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21867" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21867</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21868" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21868</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21869" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2023-21869</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21870" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21870</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21871" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21871</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21873" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21873</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21874" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L">CVE-2023-21874</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21875" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H">CVE-2023-21875</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21876" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21876</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21877" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2023-21877</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21878" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21878</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21879" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21879</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21880" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2023-21880</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21881" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21881</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21882" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N">CVE-2023-21882</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21883" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21883</cve>
          <cve public="20230117" href="https://access.redhat.com/security/cve/CVE-2023-21887" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21887</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21912" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21912</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21917" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21917</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621001" comment="mysql is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590002" comment="mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621003" comment="mysql-common is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590004" comment="mysql-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621005" comment="mysql-devel is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590006" comment="mysql-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621007" comment="mysql-errmsg is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590008" comment="mysql-errmsg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621009" comment="mysql-libs is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590010" comment="mysql-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621011" comment="mysql-server is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590012" comment="mysql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232621013" comment="mysql-test is earlier than 0:8.0.32-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590014" comment="mysql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232626" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:2626: emacs security update (Important)</title>
        <reference ref_id="RHSA-2023:2626" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2626"/>
        <reference ref_id="CVE-2022-48337" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48337"/>
        <reference ref_id="CVE-2022-48338" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48338"/>
        <reference ref_id="CVE-2022-48339" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48339"/>
        <reference ref_id="CVE-2023-2491" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2491"/>
        <reference ref_id="ALSA-2023:2626" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2626.html"/>
        <description>GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.

Security Fix(es):

* emacs: Regression of CVE-2023-28617 fixes in the AlmaLinux (CVE-2023-2491)
* emacs: command execution via shell metacharacters (CVE-2022-48337)
* emacs: local command injection in ruby-mode.el (CVE-2022-48338)
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2171987" id="2171987"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2171988" id="2171988"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2171989" id="2171989"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2192873" id="2192873"></bugzilla>
          <cve public="20230221" href="https://access.redhat.com/security/cve/CVE-2022-48337" impact="Moderate" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2022-48337</cve>
          <cve public="20230221" href="https://access.redhat.com/security/cve/CVE-2022-48338" impact="Moderate" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2022-48338</cve>
          <cve public="20230221" href="https://access.redhat.com/security/cve/CVE-2022-48339" impact="Moderate" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-48339</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-2491" impact="Important" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-2491</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232626001" comment="emacs is earlier than 1:27.2-8.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074002" comment="emacs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232626003" comment="emacs-common is earlier than 1:27.2-8.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074004" comment="emacs-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232626007" comment="emacs-lucid is earlier than 1:27.2-8.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074008" comment="emacs-lucid is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232626009" comment="emacs-nox is earlier than 1:27.2-8.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074010" comment="emacs-nox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232626005" comment="emacs-filesystem is earlier than 1:27.2-8.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232074006" comment="emacs-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232633" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:2633: libreswan security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2633" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2633"/>
        <reference ref_id="CVE-2023-23009" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23009"/>
        <reference ref_id="ALSA-2023:2633" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2633.html"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

Security Fix(es):

* libreswan: remote DoS via crafted TS payload with an incorrect selector length (CVE-2023-23009)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2173610" id="2173610"></bugzilla>
          <cve public="20230221" href="https://access.redhat.com/security/cve/CVE-2023-23009" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-23009</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20232633001" comment="libreswan is earlier than 0:4.9-2.el9_2"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244050002" comment="libreswan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232645" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:2645: openssh security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2645" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2645"/>
        <reference ref_id="CVE-2023-25136" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25136"/>
        <reference ref_id="ALSA-2023:2645" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2645.html"/>
        <description>OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* openssh: the functions order_hostkeyalgs() and list_hostkey_types() leads to double-free vulnerability (CVE-2023-25136)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2167636" id="2167636"></bugzilla>
          <cve public="20230203" href="https://access.redhat.com/security/cve/CVE-2023-25136" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H">CVE-2023-25136</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645001" comment="openssh is earlier than 0:8.7p1-29.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645002" comment="openssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645003" comment="openssh-askpass is earlier than 0:8.7p1-29.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645004" comment="openssh-askpass is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645005" comment="openssh-clients is earlier than 0:8.7p1-29.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645006" comment="openssh-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645007" comment="openssh-keycat is earlier than 0:8.7p1-29.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645008" comment="openssh-keycat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645009" comment="openssh-server is earlier than 0:8.7p1-29.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645010" comment="openssh-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645011" comment="pam_ssh_agent_auth is earlier than 0:0.10.4-5.29.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645012" comment="pam_ssh_agent_auth is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232650" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:2650: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2023:2650" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2650"/>
        <reference ref_id="CVE-2023-27535" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27535"/>
        <reference ref_id="ALSA-2023:2650" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2650.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: FTP too eager connection reuse (CVE-2023-27535)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179073" id="2179073"></bugzilla>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2023-27535" impact="Moderate" cwe="CWE-305" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-27535</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232650001" comment="curl is earlier than 0:7.76.1-23.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232650003" comment="curl-minimal is earlier than 0:7.76.1-23.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232650010" comment="libcurl is earlier than 0:7.76.1-23.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232650011" comment="libcurl-devel is earlier than 0:7.76.1-23.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232650012" comment="libcurl-minimal is earlier than 0:7.76.1-23.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232652" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:2652: pcs security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:2652" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2652"/>
        <reference ref_id="CVE-2023-2319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2319"/>
        <reference ref_id="CVE-2023-27530" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27530"/>
        <reference ref_id="CVE-2023-27539" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27539"/>
        <reference ref_id="ALSA-2023:2652" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2652.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* pcs: webpack: Regression of CVE-2023-28154 fixes in the AlmaLinux (CVE-2023-2319)
* rubygem-rack: Denial of service in Multipart MIME parsing (CVE-2023-27530)
* rubygem-rack: denial of service in header parsing (CVE-2023-27539)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Command 'pcs config checkpoint diff' does not show configuration differences between checkpoints (BZ#2180697)
* Need a way to add a scsi fencing device to a cluster without requiring a restart of all cluster resources (BZ#2180704)
* [WebUI] fence levels prevent loading of cluster status (BZ#2183180)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2190092" id="2190092"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2176477" id="2176477"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2179649" id="2179649"></bugzilla>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-2319" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-2319</cve>
          <cve public="20230308" href="https://access.redhat.com/security/cve/CVE-2023-27530" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-27530</cve>
          <cve public="20230315" href="https://access.redhat.com/security/cve/CVE-2023-27539" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-27539</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232652001" comment="pcs is earlier than 0:0.11.4-7.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232652003" comment="pcs-snmp is earlier than 0:0.11.4-7.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232653" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:2653: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:2653" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2653"/>
        <reference ref_id="CVE-2023-2203" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2203"/>
        <reference ref_id="ALSA-2023:2653" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2653.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* WebKitGTK: Regression of CVE-2023-28205 fixes in the AlmaLinux (CVE-2023-2203)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2188543" id="2188543"></bugzilla>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-2203" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-2203</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232653001" comment="webkit2gtk3 is earlier than 0:2.38.5-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232653003" comment="webkit2gtk3-devel is earlier than 0:2.38.5-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232653005" comment="webkit2gtk3-jsc is earlier than 0:2.38.5-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232653007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.38.5-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249401" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9401: microcode_ctl security update (Moderate)</title>
        <reference ref_id="CVE-2023-22655" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22655"/>
        <reference ref_id="CVE-2023-28746" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28746"/>
        <reference ref_id="CVE-2023-38575" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38575"/>
        <reference ref_id="CVE-2023-39368" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39368"/>
        <reference ref_id="CVE-2023-43490" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43490"/>
        <reference ref_id="CVE-2023-45733" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45733"/>
        <reference ref_id="CVE-2023-46103" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-46103"/>
        <reference ref_id="RHSA-2024:9401" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9401"/>
        <reference ref_id="ALSA-2024:9401" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9401.html"/>
        <description>The microcode_ctl packages provide microcode updates for Intel and AMD processors.  

Security Fix(es):  

  * kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) (CVE-2023-22655)
  * kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)
  * kernel: Local information disclosure in some Intel(R) processors (CVE-2023-38575)
  * kernel: Possible Denial of Service on Intel(R) Processors (CVE-2023-39368)
  * kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode (CVE-2023-43490)
  * intel-microcode: Race conditions in some Intel(R) Processors (CVE-2023-45733)
  * intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors (CVE-2023-46103)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2270698" id="2270698"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270700" id="2270700"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270701" id="2270701"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270703" id="2270703"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270704" id="2270704"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2292296" id="2292296"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2292300" id="2292300"></bugzilla>
          <cve public="20240312" href="https://access.redhat.com/security/cve/CVE-2023-22655" impact="Moderate" cwe="CWE-693" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N">CVE-2023-22655</cve>
          <cve public="20240214" href="https://access.redhat.com/security/cve/CVE-2023-28746" impact="Moderate" cwe="CWE-1342" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-28746</cve>
          <cve public="20240214" href="https://access.redhat.com/security/cve/CVE-2023-38575" impact="Moderate" cwe="CWE-1303" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-38575</cve>
          <cve public="20240214" href="https://access.redhat.com/security/cve/CVE-2023-39368" impact="Moderate" cwe="CWE-693" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-39368</cve>
          <cve public="20240214" href="https://access.redhat.com/security/cve/CVE-2023-43490" impact="Moderate" cwe="CWE-682" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N">CVE-2023-43490</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2023-45733" impact="Low" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N">CVE-2023-45733</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2023-46103" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-46103</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249401001" comment="microcode_ctl is earlier than 4:20240910-1.el9_5"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249401002" comment="microcode_ctl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20232655" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:2655: nodejs and nodejs-nodemon security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:2655" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:2655"/>
        <reference ref_id="CVE-2022-25881" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25881"/>
        <reference ref_id="CVE-2022-4904" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4904"/>
        <reference ref_id="CVE-2023-23918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23918"/>
        <reference ref_id="CVE-2023-23920" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23920"/>
        <reference ref_id="CVE-2023-23936" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23936"/>
        <reference ref_id="CVE-2023-24807" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24807"/>
        <reference ref_id="ALSA-2023:2655" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-2655.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20).

Security Fix(es):

* c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
* http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
* Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
* Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)
* Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
* Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-09"/>
          <updated date="2023-05-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2165824" id="2165824"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2168631" id="2168631"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2171935" id="2171935"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2172190" id="2172190"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2172204" id="2172204"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2172217" id="2172217"></bugzilla>
          <cve public="20230131" href="https://access.redhat.com/security/cve/CVE-2022-25881" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-25881</cve>
          <cve public="20221213" href="https://access.redhat.com/security/cve/CVE-2022-4904" impact="Moderate" cwe="CWE-20-&gt;CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2022-4904</cve>
          <cve public="20230216" href="https://access.redhat.com/security/cve/CVE-2023-23918" impact="Moderate" cwe="CWE-863" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-23918</cve>
          <cve public="20230216" href="https://access.redhat.com/security/cve/CVE-2023-23920" impact="Low" cwe="CWE-426" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N">CVE-2023-23920</cve>
          <cve public="20230216" href="https://access.redhat.com/security/cve/CVE-2023-23936" impact="Moderate" cwe="CWE-93" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2023-23936</cve>
          <cve public="20230216" href="https://access.redhat.com/security/cve/CVE-2023-24807" impact="Low" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24807</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232655001" comment="nodejs is earlier than 1:16.19.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232655005" comment="nodejs-full-i18n is earlier than 1:16.19.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232655010" comment="nodejs-libs is earlier than 1:16.19.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232655009" comment="npm is earlier than 1:8.19.3-1.16.19.1.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232655003" comment="nodejs-docs is earlier than 1:16.19.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233143" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3143: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:3143" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3143"/>
        <reference ref_id="CVE-2023-32205" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32205"/>
        <reference ref_id="CVE-2023-32206" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32206"/>
        <reference ref_id="CVE-2023-32207" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32207"/>
        <reference ref_id="CVE-2023-32211" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32211"/>
        <reference ref_id="CVE-2023-32212" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32212"/>
        <reference ref_id="CVE-2023-32213" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32213"/>
        <reference ref_id="CVE-2023-32215" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32215"/>
        <reference ref_id="ALSA-2023:3143" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3143.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.11.0 ESR.

Security Fix(es):

* Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205)
* Mozilla: Crash in RLBox Expat driver (CVE-2023-32206)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207)
* Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215)
* Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211)
* Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212)
* Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-16"/>
          <updated date="2023-05-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2196736" id="2196736"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196737" id="2196737"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196738" id="2196738"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196740" id="2196740"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196741" id="2196741"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196742" id="2196742"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196753" id="2196753"></bugzilla>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32205" impact="Important" cwe="CWE-451" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32205</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32206" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32206</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32207" impact="Important" cwe="CWE-280" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32207</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32211" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-32211</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32212" impact="Moderate" cwe="CWE-345" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-32212</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32213" impact="Moderate" cwe="CWE-457" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-32213</cve>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-32215" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32215</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233143004" comment="firefox is earlier than 0:102.11.0-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233143005" comment="firefox-x11 is earlier than 0:102.11.0-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233147" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3147: apr-util security update (Important)</title>
        <reference ref_id="RHSA-2023:3147" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3147"/>
        <reference ref_id="CVE-2022-25147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-25147"/>
        <reference ref_id="ALSA-2023:3147" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3147.html"/>
        <description>The Apache Portable Runtime (APR) is a portability library used by the
Apache HTTP Server and other projects. apr-util is a library which provides
additional utility interfaces for APR; including support for XML parsing,
LDAP, database interfaces, URI parsing, and more.

Security Fix(es):

* apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-16"/>
          <updated date="2023-05-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2169652" id="2169652"></bugzilla>
          <cve public="20230131" href="https://access.redhat.com/security/cve/CVE-2022-25147" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2022-25147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147001" comment="apr-util is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147002" comment="apr-util is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147003" comment="apr-util-bdb is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147004" comment="apr-util-bdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147005" comment="apr-util-devel is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147006" comment="apr-util-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147019" comment="apr-util-ldap is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147008" comment="apr-util-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147020" comment="apr-util-mysql is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147010" comment="apr-util-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147021" comment="apr-util-odbc is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147012" comment="apr-util-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147022" comment="apr-util-openssl is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147014" comment="apr-util-openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147023" comment="apr-util-pgsql is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147016" comment="apr-util-pgsql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147024" comment="apr-util-sqlite is earlier than 0:1.6.1-20.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233147018" comment="apr-util-sqlite is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233148" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3148: libreswan security update (Important)</title>
        <reference ref_id="RHSA-2023:3148" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3148"/>
        <reference ref_id="CVE-2023-2295" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2295"/>
        <reference ref_id="ALSA-2023:3148" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3148.html"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

Security Fix(es):

* libreswan: Regression of CVE-2023-30570 fixes in the AlmaLinux (CVE-2023-2295)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-16"/>
          <updated date="2023-05-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2189777" id="2189777"></bugzilla>
          <cve public="20230509" href="https://access.redhat.com/security/cve/CVE-2023-2295" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-2295</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20233148001" comment="libreswan is earlier than 0:4.9-4.el9_2"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244050002" comment="libreswan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233245" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3245: git security update (Important)</title>
        <reference ref_id="RHSA-2023:3245" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3245"/>
        <reference ref_id="CVE-2023-22490" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22490"/>
        <reference ref_id="CVE-2023-23946" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-23946"/>
        <reference ref_id="CVE-2023-25652" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25652"/>
        <reference ref_id="CVE-2023-25815" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25815"/>
        <reference ref_id="CVE-2023-29007" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29007"/>
        <reference ref_id="ALSA-2023:3245" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3245.html"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652)
* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007)
* git: data exfiltration with maliciously crafted repository (CVE-2023-22490)
* git: git apply: a path outside the working tree can be overwritten with crafted input (CVE-2023-23946)
* git: malicious placement of crafted messages when git was compiled with runtime prefix (CVE-2023-25815)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-22"/>
          <updated date="2023-05-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2168160" id="2168160"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2168161" id="2168161"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188333" id="2188333"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188337" id="2188337"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188338" id="2188338"></bugzilla>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-22490" impact="Moderate" cwe="CWE-402" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-22490</cve>
          <cve public="20230214" href="https://access.redhat.com/security/cve/CVE-2023-23946" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-23946</cve>
          <cve public="20230425" href="https://access.redhat.com/security/cve/CVE-2023-25652" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-25652</cve>
          <cve public="20230425" href="https://access.redhat.com/security/cve/CVE-2023-25815" impact="Low" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N">CVE-2023-25815</cve>
          <cve public="20230425" href="https://access.redhat.com/security/cve/CVE-2023-29007" impact="Important" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29007</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245001" comment="git is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611002" comment="git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245005" comment="git-core is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611006" comment="git-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245009" comment="git-credential-libsecret is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611010" comment="git-credential-libsecret is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245011" comment="git-daemon is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611012" comment="git-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245019" comment="git-subtree is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611020" comment="git-subtree is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245003" comment="git-all is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611004" comment="git-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245007" comment="git-core-doc is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611008" comment="git-core-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245013" comment="git-email is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611014" comment="git-email is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245015" comment="git-gui is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611016" comment="git-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245017" comment="git-instaweb is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611018" comment="git-instaweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245021" comment="git-svn is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611022" comment="git-svn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245023" comment="gitk is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611024" comment="gitk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245025" comment="gitweb is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611026" comment="gitweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245027" comment="perl-Git is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611028" comment="perl-Git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233245029" comment="perl-Git-SVN is earlier than 0:2.39.3-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611030" comment="perl-Git-SVN is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233318" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3318: go-toolset and golang security update (Important)</title>
        <reference ref_id="RHSA-2023:3318" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3318"/>
        <reference ref_id="CVE-2023-24540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24540"/>
        <reference ref_id="ALSA-2023:3318" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3318.html"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. 

The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-05-25"/>
          <updated date="2023-05-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2196027" id="2196027"></bugzilla>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-24540" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-24540</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318016" comment="go-toolset is earlier than 0:1.19.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318017" comment="golang is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318018" comment="golang-bin is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318019" comment="golang-race is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799010" comment="golang-race is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318020" comment="golang-docs is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318021" comment="golang-misc is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318022" comment="golang-src is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233318023" comment="golang-tests is earlier than 0:1.19.9-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233423" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:3423: cups-filters security update (Important)</title>
        <reference ref_id="RHSA-2023:3423" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3423"/>
        <reference ref_id="CVE-2023-24805" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24805"/>
        <reference ref_id="ALSA-2023:3423" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3423.html"/>
        <description>The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. 

Security Fix(es):

* cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-05"/>
          <updated date="2023-06-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2203051" id="2203051"></bugzilla>
          <cve public="20230517" href="https://access.redhat.com/security/cve/CVE-2023-24805" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-24805</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233423001" comment="cups-filters is earlier than 0:1.28.7-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233423002" comment="cups-filters is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233423007" comment="cups-filters-devel is earlier than 0:1.28.7-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233423004" comment="cups-filters-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233423008" comment="cups-filters-libs is earlier than 0:1.28.7-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233423006" comment="cups-filters-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233432" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:3432: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:3432" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3432"/>
        <reference ref_id="CVE-2023-28204" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28204"/>
        <reference ref_id="CVE-2023-32373" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32373"/>
        <reference ref_id="ALSA-2023:3432" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3432.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-05"/>
          <updated date="2023-06-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2209208" id="2209208"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209214" id="2209214"></bugzilla>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-28204" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-28204</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-32373" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32373</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233432001" comment="webkit2gtk3 is earlier than 0:2.38.5-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233432003" comment="webkit2gtk3-devel is earlier than 0:2.38.5-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233432005" comment="webkit2gtk3-jsc is earlier than 0:2.38.5-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233432007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.38.5-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233559" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3559: c-ares security update (Important)</title>
        <reference ref_id="RHSA-2023:3559" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3559"/>
        <reference ref_id="CVE-2023-32067" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32067"/>
        <reference ref_id="ALSA-2023:3559" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3559.html"/>
        <description>The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.

Security Fix(es):

* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-13"/>
          <updated date="2023-06-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2209502" id="2209502"></bugzilla>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-32067" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-32067</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233559001" comment="c-ares is earlier than 0:1.17.1-5.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243842004" comment="c-ares is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233559003" comment="c-ares-devel is earlier than 0:1.17.1-5.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243842005" comment="c-ares-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249405" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9405: vim security update (Low)</title>
        <reference ref_id="CVE-2021-3903" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3903"/>
        <reference ref_id="RHSA-2024:9405" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9405"/>
        <reference ref_id="ALSA-2024:9405" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9405.html"/>
        <description>Vim (Vi IMproved) is an updated and improved version of the vi editor.  

Security Fix(es):  

  * vim: heap-based buffer overflow vulnerability (CVE-2021-3903)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2018558" id="2018558"></bugzilla>
          <cve public="20211024" href="https://access.redhat.com/security/cve/CVE-2021-3903" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2021-3903</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249405001" comment="vim-X11 is earlier than 2:8.2.2637-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242002" comment="vim-X11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249405002" comment="vim-common is earlier than 2:8.2.2637-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242004" comment="vim-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249405003" comment="vim-enhanced is earlier than 2:8.2.2637-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242006" comment="vim-enhanced is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249405004" comment="vim-minimal is earlier than 2:8.2.2637-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242010" comment="vim-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249405005" comment="vim-filesystem is earlier than 2:8.2.2637-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225242008" comment="vim-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233581" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:3581: .NET 6.0 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:3581" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3581"/>
        <reference ref_id="CVE-2023-24936" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24936"/>
        <reference ref_id="CVE-2023-29331" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29331"/>
        <reference ref_id="CVE-2023-29337" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29337"/>
        <reference ref_id="CVE-2023-33128" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-33128"/>
        <reference ref_id="ALSA-2023:3581" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3581.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.118 and .NET Runtime 6.0.18.

The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.118). (BZ#2212379)

Security Fix(es):

* dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331)
* dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337)
* dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128)
* dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-14"/>
          <updated date="2023-06-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2192438" id="2192438"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212617" id="2212617"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212618" id="2212618"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213703" id="2213703"></bugzilla>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-24936" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-24936</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-29331" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-29331</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-29337" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29337</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-33128" impact="Important" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2023-33128</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.18-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.18-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.18-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.18-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.18-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.118-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.118-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.18-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233581017" comment="dotnet-templates-6.0 is earlier than 0:6.0.118-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233585" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3585: python3.11 security update (Important)</title>
        <reference ref_id="RHSA-2023:3585" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3585"/>
        <reference ref_id="CVE-2023-24329" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24329"/>
        <reference ref_id="ALSA-2023:3585" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3585.html"/>
        <description>Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries.

Security Fix(es):

* python: urllib.parse url blocklisting bypass (CVE-2023-24329)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-14"/>
          <updated date="2023-06-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2173917" id="2173917"></bugzilla>
          <cve public="20230217" href="https://access.redhat.com/security/cve/CVE-2023-24329" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-24329</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585001" comment="python3.11 is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077014" comment="python3.11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585003" comment="python3.11-debug is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077015" comment="python3.11-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585005" comment="python3.11-devel is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077016" comment="python3.11-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585007" comment="python3.11-idle is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077017" comment="python3.11-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585009" comment="python3.11-libs is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077018" comment="python3.11-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585011" comment="python3.11-test is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077019" comment="python3.11-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233585013" comment="python3.11-tkinter is earlier than 0:3.11.2-2.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077020" comment="python3.11-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233586" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3586: nodejs security update (Important)</title>
        <reference ref_id="RHSA-2023:3586" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3586"/>
        <reference ref_id="CVE-2023-31124" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31124"/>
        <reference ref_id="CVE-2023-31130" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31130"/>
        <reference ref_id="CVE-2023-31147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31147"/>
        <reference ref_id="CVE-2023-32067" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32067"/>
        <reference ref_id="ALSA-2023:3586" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3586.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
* c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
* c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-14"/>
          <updated date="2023-06-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2209494" id="2209494"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209497" id="2209497"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209501" id="2209501"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209502" id="2209502"></bugzilla>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-31124" impact="Low" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-31124</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-31130" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-31130</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-31147" impact="Moderate" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-31147</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-32067" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-32067</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233586001" comment="nodejs is earlier than 1:16.19.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233586005" comment="nodejs-full-i18n is earlier than 1:16.19.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233586010" comment="nodejs-libs is earlier than 1:16.19.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233586009" comment="npm is earlier than 1:8.19.3-1.16.19.1.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233586003" comment="nodejs-docs is earlier than 1:16.19.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233589" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3589: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:3589" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3589"/>
        <reference ref_id="CVE-2023-34414" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34414"/>
        <reference ref_id="CVE-2023-34416" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34416"/>
        <reference ref_id="ALSA-2023:3589" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3589.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.12.0 ESR.

Security Fix(es):

* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414)
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-14"/>
          <updated date="2023-06-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2212841" id="2212841"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212842" id="2212842"></bugzilla>
          <cve public="20230606" href="https://access.redhat.com/security/cve/CVE-2023-34414" impact="Important" cwe="CWE-449" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-34414</cve>
          <cve public="20230606" href="https://access.redhat.com/security/cve/CVE-2023-34416" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-34416</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233589004" comment="firefox is earlier than 0:102.12.0-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233589005" comment="firefox-x11 is earlier than 0:102.12.0-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233592" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:3592: .NET 7.0 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:3592" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3592"/>
        <reference ref_id="CVE-2023-24936" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24936"/>
        <reference ref_id="CVE-2023-29331" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29331"/>
        <reference ref_id="CVE-2023-29337" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29337"/>
        <reference ref_id="CVE-2023-32032" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32032"/>
        <reference ref_id="CVE-2023-33128" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-33128"/>
        <reference ref_id="ALSA-2023:3592" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3592.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.107 and .NET Runtime 7.0.7.

The following packages have been upgraded to a later upstream version: dotnet7.0 (7.0.107). (BZ#2211877)

Security Fix(es):

* dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331)
* dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337)
* dotnet: Elevation of privilege - TarFile.ExtractToDirectory ignores extraction directory argument (CVE-2023-32032)
* dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128)
* dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-14"/>
          <updated date="2023-06-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2192438" id="2192438"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212615" id="2212615"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212617" id="2212617"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212618" id="2212618"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213703" id="2213703"></bugzilla>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-24936" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-24936</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-29331" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-29331</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-29337" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29337</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-32032" impact="Important" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H">CVE-2023-32032</cve>
          <cve public="20230614" href="https://access.redhat.com/security/cve/CVE-2023-33128" impact="Important" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2023-33128</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592007" comment="dotnet-host is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.107-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.107-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.7-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592019" comment="dotnet-templates-7.0 is earlier than 0:7.0.107-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233592021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.107-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233595" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3595: python3.9 security update (Important)</title>
        <reference ref_id="RHSA-2023:3595" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3595"/>
        <reference ref_id="CVE-2023-24329" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24329"/>
        <reference ref_id="ALSA-2023:3595" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3595.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: urllib.parse url blocklisting bypass (CVE-2023-24329)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-14"/>
          <updated date="2023-06-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2173917" id="2173917"></bugzilla>
          <cve public="20230217" href="https://access.redhat.com/security/cve/CVE-2023-24329" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-24329</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595003" comment="python3 is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595005" comment="python3-debug is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595007" comment="python3-devel is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595009" comment="python3-idle is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595011" comment="python3-libs is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595013" comment="python3-test is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595015" comment="python3-tkinter is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233595001" comment="python-unversioned-command is earlier than 0:3.9.16-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233661" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:3661: texlive security update (Important)</title>
        <reference ref_id="RHSA-2023:3661" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3661"/>
        <reference ref_id="CVE-2023-32700" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32700"/>
        <reference ref_id="ALSA-2023:3661" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3661.html"/>
        <description>The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems.

Security Fix(es):

* texlive: arbitrary code execution allows document complied with older version (CVE-2023-32700)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-19"/>
          <updated date="2023-06-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2208943" id="2208943"></bugzilla>
          <cve public="20230520" href="https://access.redhat.com/security/cve/CVE-2023-32700" impact="Important" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32700</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661001" comment="texlive is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661002" comment="texlive is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661055" comment="texlive-bibtex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661056" comment="texlive-bibtex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661147" comment="texlive-dvipdfmx is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661148" comment="texlive-dvipdfmx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661149" comment="texlive-dvipng is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661150" comment="texlive-dvipng is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661151" comment="texlive-dvips is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661152" comment="texlive-dvips is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661153" comment="texlive-dvisvgm is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661154" comment="texlive-dvisvgm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661227" comment="texlive-fontware is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661228" comment="texlive-fontware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661261" comment="texlive-gsftopk is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661262" comment="texlive-gsftopk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661313" comment="texlive-kpathsea is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661314" comment="texlive-kpathsea is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661743" comment="texlive-lib is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661346" comment="texlive-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661744" comment="texlive-lib-devel is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661348" comment="texlive-lib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661369" comment="texlive-luahbtex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661370" comment="texlive-luahbtex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661377" comment="texlive-luatex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661378" comment="texlive-luatex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661387" comment="texlive-makeindex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661388" comment="texlive-makeindex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661405" comment="texlive-metafont is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661406" comment="texlive-metafont is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661409" comment="texlive-metapost is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661410" comment="texlive-metapost is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661417" comment="texlive-mfware is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661418" comment="texlive-mfware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661479" comment="texlive-pdftex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661480" comment="texlive-pdftex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661597" comment="texlive-tex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661598" comment="texlive-tex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661605" comment="texlive-tex4ht is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661606" comment="texlive-tex4ht is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661695" comment="texlive-xdvi is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661696" comment="texlive-xdvi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661709" comment="texlive-xetex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661710" comment="texlive-xetex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661003" comment="texlive-adjustbox is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661004" comment="texlive-adjustbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661005" comment="texlive-ae is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661006" comment="texlive-ae is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661007" comment="texlive-algorithms is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661008" comment="texlive-algorithms is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661009" comment="texlive-alphalph is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661010" comment="texlive-alphalph is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661011" comment="texlive-amscls is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661012" comment="texlive-amscls is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661013" comment="texlive-amsfonts is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661014" comment="texlive-amsfonts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661015" comment="texlive-amsmath is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661016" comment="texlive-amsmath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661017" comment="texlive-anyfontsize is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661018" comment="texlive-anyfontsize is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661019" comment="texlive-anysize is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661020" comment="texlive-anysize is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661021" comment="texlive-appendix is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661022" comment="texlive-appendix is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661023" comment="texlive-arabxetex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661024" comment="texlive-arabxetex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661025" comment="texlive-arphic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661026" comment="texlive-arphic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661027" comment="texlive-atbegshi is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661028" comment="texlive-atbegshi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661029" comment="texlive-attachfile is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661030" comment="texlive-attachfile is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661031" comment="texlive-attachfile2 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661032" comment="texlive-attachfile2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661033" comment="texlive-atveryend is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661034" comment="texlive-atveryend is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661035" comment="texlive-auxhook is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661036" comment="texlive-auxhook is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661037" comment="texlive-avantgar is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661038" comment="texlive-avantgar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661039" comment="texlive-awesomebox is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661040" comment="texlive-awesomebox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661041" comment="texlive-babel is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661042" comment="texlive-babel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661043" comment="texlive-babel-english is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661044" comment="texlive-babel-english is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661045" comment="texlive-babelbib is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661046" comment="texlive-babelbib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661047" comment="texlive-base is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661048" comment="texlive-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661049" comment="texlive-beamer is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661050" comment="texlive-beamer is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661051" comment="texlive-bera is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661052" comment="texlive-bera is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661053" comment="texlive-beton is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661054" comment="texlive-beton is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661057" comment="texlive-bibtopic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661058" comment="texlive-bibtopic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661059" comment="texlive-bidi is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661060" comment="texlive-bidi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661061" comment="texlive-bigfoot is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661062" comment="texlive-bigfoot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661063" comment="texlive-bigintcalc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661064" comment="texlive-bigintcalc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661065" comment="texlive-bitset is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661066" comment="texlive-bitset is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661067" comment="texlive-bookman is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661068" comment="texlive-bookman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661069" comment="texlive-bookmark is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661070" comment="texlive-bookmark is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661071" comment="texlive-booktabs is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661072" comment="texlive-booktabs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661073" comment="texlive-breakurl is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661074" comment="texlive-breakurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661075" comment="texlive-breqn is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661076" comment="texlive-breqn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661077" comment="texlive-capt-of is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661078" comment="texlive-capt-of is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661079" comment="texlive-caption is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661080" comment="texlive-caption is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661081" comment="texlive-carlisle is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661082" comment="texlive-carlisle is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661083" comment="texlive-catchfile is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661084" comment="texlive-catchfile is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661085" comment="texlive-changebar is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661086" comment="texlive-changebar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661087" comment="texlive-changepage is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661088" comment="texlive-changepage is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661089" comment="texlive-charter is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661090" comment="texlive-charter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661091" comment="texlive-chngcntr is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661092" comment="texlive-chngcntr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661093" comment="texlive-cite is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661094" comment="texlive-cite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661095" comment="texlive-cjk is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661096" comment="texlive-cjk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661097" comment="texlive-classpack is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661098" comment="texlive-classpack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661099" comment="texlive-cm is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661100" comment="texlive-cm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661101" comment="texlive-cm-lgc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661102" comment="texlive-cm-lgc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661103" comment="texlive-cm-super is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661104" comment="texlive-cm-super is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661105" comment="texlive-cmap is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661106" comment="texlive-cmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661107" comment="texlive-cmextra is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661108" comment="texlive-cmextra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661109" comment="texlive-cns is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661110" comment="texlive-cns is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661111" comment="texlive-collectbox is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661112" comment="texlive-collectbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661113" comment="texlive-collection-basic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661114" comment="texlive-collection-basic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661115" comment="texlive-collection-fontsrecommended is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661116" comment="texlive-collection-fontsrecommended is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661117" comment="texlive-collection-htmlxml is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661118" comment="texlive-collection-htmlxml is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661119" comment="texlive-collection-latex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661120" comment="texlive-collection-latex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661121" comment="texlive-collection-latexrecommended is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661122" comment="texlive-collection-latexrecommended is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661123" comment="texlive-collection-xetex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661124" comment="texlive-collection-xetex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661125" comment="texlive-colorprofiles is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661126" comment="texlive-colorprofiles is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661127" comment="texlive-colortbl is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661128" comment="texlive-colortbl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661129" comment="texlive-context is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661130" comment="texlive-context is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661131" comment="texlive-courier is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661132" comment="texlive-courier is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661133" comment="texlive-crop is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661134" comment="texlive-crop is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661135" comment="texlive-csquotes is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661136" comment="texlive-csquotes is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661137" comment="texlive-ctable is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661138" comment="texlive-ctable is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661139" comment="texlive-ctablestack is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661140" comment="texlive-ctablestack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661141" comment="texlive-currfile is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661142" comment="texlive-currfile is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661143" comment="texlive-datetime is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661144" comment="texlive-datetime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661145" comment="texlive-dehyph is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661146" comment="texlive-dehyph is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661155" comment="texlive-ec is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661156" comment="texlive-ec is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661157" comment="texlive-eepic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661158" comment="texlive-eepic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661159" comment="texlive-enctex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661160" comment="texlive-enctex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661161" comment="texlive-enumitem is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661162" comment="texlive-enumitem is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661163" comment="texlive-environ is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661164" comment="texlive-environ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661165" comment="texlive-epsf is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661166" comment="texlive-epsf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661167" comment="texlive-epstopdf is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661168" comment="texlive-epstopdf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661169" comment="texlive-epstopdf-pkg is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661170" comment="texlive-epstopdf-pkg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661171" comment="texlive-eqparbox is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661172" comment="texlive-eqparbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661173" comment="texlive-eso-pic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661174" comment="texlive-eso-pic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661175" comment="texlive-etex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661176" comment="texlive-etex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661177" comment="texlive-etex-pkg is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661178" comment="texlive-etex-pkg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661179" comment="texlive-etexcmds is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661180" comment="texlive-etexcmds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661181" comment="texlive-etoc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661182" comment="texlive-etoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661183" comment="texlive-etoolbox is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661184" comment="texlive-etoolbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661185" comment="texlive-euenc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661186" comment="texlive-euenc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661187" comment="texlive-euler is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661188" comment="texlive-euler is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661189" comment="texlive-euro is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661190" comment="texlive-euro is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661191" comment="texlive-eurosym is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661192" comment="texlive-eurosym is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661193" comment="texlive-extsizes is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661194" comment="texlive-extsizes is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661195" comment="texlive-fancybox is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661196" comment="texlive-fancybox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661197" comment="texlive-fancyhdr is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661198" comment="texlive-fancyhdr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661199" comment="texlive-fancyref is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661200" comment="texlive-fancyref is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661201" comment="texlive-fancyvrb is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661202" comment="texlive-fancyvrb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661203" comment="texlive-filecontents is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661204" comment="texlive-filecontents is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661205" comment="texlive-filehook is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661206" comment="texlive-filehook is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661207" comment="texlive-finstrut is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661208" comment="texlive-finstrut is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661209" comment="texlive-fix2col is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661210" comment="texlive-fix2col is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661211" comment="texlive-fixlatvian is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661212" comment="texlive-fixlatvian is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661213" comment="texlive-float is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661214" comment="texlive-float is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661215" comment="texlive-fmtcount is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661216" comment="texlive-fmtcount is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661217" comment="texlive-fncychap is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661218" comment="texlive-fncychap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661219" comment="texlive-fontawesome is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661220" comment="texlive-fontawesome is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661221" comment="texlive-fontbook is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661222" comment="texlive-fontbook is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661223" comment="texlive-fonts-tlwg is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661224" comment="texlive-fonts-tlwg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661225" comment="texlive-fontspec is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661226" comment="texlive-fontspec is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661229" comment="texlive-fontwrap is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661230" comment="texlive-fontwrap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661231" comment="texlive-footmisc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661232" comment="texlive-footmisc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661233" comment="texlive-footnotehyper is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661234" comment="texlive-footnotehyper is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661235" comment="texlive-fp is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661236" comment="texlive-fp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661237" comment="texlive-fpl is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661238" comment="texlive-fpl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661239" comment="texlive-framed is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661240" comment="texlive-framed is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661241" comment="texlive-garuda-c90 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661242" comment="texlive-garuda-c90 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661243" comment="texlive-geometry is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661244" comment="texlive-geometry is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661245" comment="texlive-gettitlestring is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661246" comment="texlive-gettitlestring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661247" comment="texlive-glyphlist is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661248" comment="texlive-glyphlist is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661249" comment="texlive-gnu-freefont is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661250" comment="texlive-gnu-freefont is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661251" comment="texlive-graphics is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661252" comment="texlive-graphics is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661253" comment="texlive-graphics-cfg is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661254" comment="texlive-graphics-cfg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661255" comment="texlive-graphics-def is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661256" comment="texlive-graphics-def is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661257" comment="texlive-grfext is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661258" comment="texlive-grfext is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661259" comment="texlive-grffile is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661260" comment="texlive-grffile is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661263" comment="texlive-hanging is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661264" comment="texlive-hanging is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661265" comment="texlive-helvetic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661266" comment="texlive-helvetic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661267" comment="texlive-hobsub is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661268" comment="texlive-hobsub is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661269" comment="texlive-hologo is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661270" comment="texlive-hologo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661271" comment="texlive-hycolor is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661272" comment="texlive-hycolor is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661273" comment="texlive-hyperref is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661274" comment="texlive-hyperref is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661275" comment="texlive-hyph-utf8 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661276" comment="texlive-hyph-utf8 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661277" comment="texlive-hyphen-base is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661278" comment="texlive-hyphen-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661279" comment="texlive-hyphenat is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661280" comment="texlive-hyphenat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661281" comment="texlive-hyphenex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661282" comment="texlive-hyphenex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661283" comment="texlive-ifmtarg is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661284" comment="texlive-ifmtarg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661285" comment="texlive-ifoddpage is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661286" comment="texlive-ifoddpage is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661287" comment="texlive-ifplatform is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661288" comment="texlive-ifplatform is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661289" comment="texlive-iftex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661290" comment="texlive-iftex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661291" comment="texlive-import is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661292" comment="texlive-import is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661293" comment="texlive-index is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661294" comment="texlive-index is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661295" comment="texlive-infwarerr is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661296" comment="texlive-infwarerr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661297" comment="texlive-intcalc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661298" comment="texlive-intcalc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661299" comment="texlive-jadetex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661300" comment="texlive-jadetex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661301" comment="texlive-jknapltx is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661302" comment="texlive-jknapltx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661303" comment="texlive-kastrup is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661304" comment="texlive-kastrup is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661305" comment="texlive-kerkis is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661306" comment="texlive-kerkis is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661307" comment="texlive-knuth-lib is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661308" comment="texlive-knuth-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661309" comment="texlive-knuth-local is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661310" comment="texlive-knuth-local is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661311" comment="texlive-koma-script is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661312" comment="texlive-koma-script is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661315" comment="texlive-kvdefinekeys is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661316" comment="texlive-kvdefinekeys is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661317" comment="texlive-kvoptions is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661318" comment="texlive-kvoptions is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661319" comment="texlive-kvsetkeys is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661320" comment="texlive-kvsetkeys is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661321" comment="texlive-l3backend is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661322" comment="texlive-l3backend is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661323" comment="texlive-l3experimental is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661324" comment="texlive-l3experimental is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661325" comment="texlive-l3kernel is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661326" comment="texlive-l3kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661327" comment="texlive-l3packages is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661328" comment="texlive-l3packages is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661329" comment="texlive-lastpage is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661330" comment="texlive-lastpage is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661331" comment="texlive-latex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661332" comment="texlive-latex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661333" comment="texlive-latex-fonts is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661334" comment="texlive-latex-fonts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661335" comment="texlive-latex2man is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661336" comment="texlive-latex2man is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661337" comment="texlive-latexbug is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661338" comment="texlive-latexbug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661339" comment="texlive-latexconfig is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661340" comment="texlive-latexconfig is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661341" comment="texlive-letltxmacro is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661342" comment="texlive-letltxmacro is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661343" comment="texlive-lettrine is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661344" comment="texlive-lettrine is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661349" comment="texlive-linegoal is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661350" comment="texlive-linegoal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661351" comment="texlive-lineno is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661352" comment="texlive-lineno is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661353" comment="texlive-listings is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661354" comment="texlive-listings is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661355" comment="texlive-listofitems is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661356" comment="texlive-listofitems is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661357" comment="texlive-lm is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661358" comment="texlive-lm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661359" comment="texlive-lm-math is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661360" comment="texlive-lm-math is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661361" comment="texlive-ltabptch is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661362" comment="texlive-ltabptch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661363" comment="texlive-ltxcmds is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661364" comment="texlive-ltxcmds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661365" comment="texlive-ltxmisc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661366" comment="texlive-ltxmisc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661367" comment="texlive-lua-alt-getopt is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661368" comment="texlive-lua-alt-getopt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661371" comment="texlive-lualatex-math is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661372" comment="texlive-lualatex-math is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661373" comment="texlive-lualibs is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661374" comment="texlive-lualibs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661375" comment="texlive-luaotfload is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661376" comment="texlive-luaotfload is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661379" comment="texlive-luatex85 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661380" comment="texlive-luatex85 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661381" comment="texlive-luatexbase is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661382" comment="texlive-luatexbase is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661383" comment="texlive-lwarp is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661384" comment="texlive-lwarp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661385" comment="texlive-makecmds is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661386" comment="texlive-makecmds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661389" comment="texlive-manfnt-font is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661390" comment="texlive-manfnt-font is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661391" comment="texlive-marginnote is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661392" comment="texlive-marginnote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661393" comment="texlive-marvosym is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661394" comment="texlive-marvosym is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661395" comment="texlive-mathpazo is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661396" comment="texlive-mathpazo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661397" comment="texlive-mathspec is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661398" comment="texlive-mathspec is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661399" comment="texlive-mathtools is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661400" comment="texlive-mathtools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661401" comment="texlive-mdwtools is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661402" comment="texlive-mdwtools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661403" comment="texlive-memoir is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661404" comment="texlive-memoir is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661407" comment="texlive-metalogo is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661408" comment="texlive-metalogo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661411" comment="texlive-mflogo is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661412" comment="texlive-mflogo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661413" comment="texlive-mflogo-font is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661414" comment="texlive-mflogo-font is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661415" comment="texlive-mfnfss is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661416" comment="texlive-mfnfss is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661419" comment="texlive-microtype is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661420" comment="texlive-microtype is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661421" comment="texlive-minitoc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661422" comment="texlive-minitoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661423" comment="texlive-mnsymbol is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661424" comment="texlive-mnsymbol is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661425" comment="texlive-modes is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661426" comment="texlive-modes is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661427" comment="texlive-mparhack is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661428" comment="texlive-mparhack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661429" comment="texlive-mptopdf is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661430" comment="texlive-mptopdf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661431" comment="texlive-ms is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661432" comment="texlive-ms is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661433" comment="texlive-multido is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661434" comment="texlive-multido is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661435" comment="texlive-multirow is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661436" comment="texlive-multirow is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661437" comment="texlive-natbib is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661438" comment="texlive-natbib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661439" comment="texlive-ncctools is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661440" comment="texlive-ncctools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661441" comment="texlive-ncntrsbk is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661442" comment="texlive-ncntrsbk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661443" comment="texlive-needspace is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661444" comment="texlive-needspace is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661445" comment="texlive-newfloat is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661446" comment="texlive-newfloat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661447" comment="texlive-newunicodechar is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661448" comment="texlive-newunicodechar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661449" comment="texlive-norasi-c90 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661450" comment="texlive-norasi-c90 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661451" comment="texlive-notoccite is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661452" comment="texlive-notoccite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661453" comment="texlive-ntgclass is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661454" comment="texlive-ntgclass is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661455" comment="texlive-oberdiek is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661456" comment="texlive-oberdiek is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661457" comment="texlive-obsolete is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661458" comment="texlive-obsolete is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661459" comment="texlive-overpic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661460" comment="texlive-overpic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661461" comment="texlive-palatino is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661462" comment="texlive-palatino is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661463" comment="texlive-paralist is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661464" comment="texlive-paralist is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661465" comment="texlive-parallel is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661466" comment="texlive-parallel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661467" comment="texlive-parskip is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661468" comment="texlive-parskip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661469" comment="texlive-passivetex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661470" comment="texlive-passivetex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661471" comment="texlive-pdfcolmk is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661472" comment="texlive-pdfcolmk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661473" comment="texlive-pdfescape is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661474" comment="texlive-pdfescape is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661475" comment="texlive-pdflscape is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661476" comment="texlive-pdflscape is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661477" comment="texlive-pdfpages is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661478" comment="texlive-pdfpages is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661481" comment="texlive-pdftexcmds is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661482" comment="texlive-pdftexcmds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661483" comment="texlive-pgf is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661484" comment="texlive-pgf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661485" comment="texlive-philokalia is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661486" comment="texlive-philokalia is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661487" comment="texlive-placeins is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661488" comment="texlive-placeins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661489" comment="texlive-plain is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661490" comment="texlive-plain is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661491" comment="texlive-polyglossia is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661492" comment="texlive-polyglossia is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661493" comment="texlive-powerdot is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661494" comment="texlive-powerdot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661495" comment="texlive-preprint is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661496" comment="texlive-preprint is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661497" comment="texlive-psfrag is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661498" comment="texlive-psfrag is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661499" comment="texlive-pslatex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661500" comment="texlive-pslatex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661501" comment="texlive-psnfss is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661502" comment="texlive-psnfss is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661503" comment="texlive-pspicture is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661504" comment="texlive-pspicture is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661505" comment="texlive-pst-3d is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661506" comment="texlive-pst-3d is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661507" comment="texlive-pst-arrow is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661508" comment="texlive-pst-arrow is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661509" comment="texlive-pst-blur is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661510" comment="texlive-pst-blur is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661511" comment="texlive-pst-coil is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661512" comment="texlive-pst-coil is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661513" comment="texlive-pst-eps is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661514" comment="texlive-pst-eps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661515" comment="texlive-pst-fill is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661516" comment="texlive-pst-fill is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661517" comment="texlive-pst-grad is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661518" comment="texlive-pst-grad is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661519" comment="texlive-pst-math is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661520" comment="texlive-pst-math is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661521" comment="texlive-pst-node is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661522" comment="texlive-pst-node is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661523" comment="texlive-pst-plot is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661524" comment="texlive-pst-plot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661525" comment="texlive-pst-slpe is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661526" comment="texlive-pst-slpe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661527" comment="texlive-pst-text is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661528" comment="texlive-pst-text is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661529" comment="texlive-pst-tools is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661530" comment="texlive-pst-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661531" comment="texlive-pst-tree is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661532" comment="texlive-pst-tree is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661533" comment="texlive-pstricks is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661534" comment="texlive-pstricks is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661535" comment="texlive-pstricks-add is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661536" comment="texlive-pstricks-add is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661537" comment="texlive-ptext is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661538" comment="texlive-ptext is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661539" comment="texlive-pxfonts is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661540" comment="texlive-pxfonts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661541" comment="texlive-qstest is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661542" comment="texlive-qstest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661543" comment="texlive-ragged2e is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661544" comment="texlive-ragged2e is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661545" comment="texlive-rcs is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661546" comment="texlive-rcs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661547" comment="texlive-realscripts is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661548" comment="texlive-realscripts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661549" comment="texlive-refcount is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661550" comment="texlive-refcount is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661551" comment="texlive-rerunfilecheck is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661552" comment="texlive-rerunfilecheck is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661553" comment="texlive-rsfs is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661554" comment="texlive-rsfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661555" comment="texlive-sansmath is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661556" comment="texlive-sansmath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661557" comment="texlive-sansmathaccent is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661558" comment="texlive-sansmathaccent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661559" comment="texlive-sauerj is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661560" comment="texlive-sauerj is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661561" comment="texlive-scheme-basic is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661562" comment="texlive-scheme-basic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661563" comment="texlive-section is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661564" comment="texlive-section is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661565" comment="texlive-sectsty is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661566" comment="texlive-sectsty is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661567" comment="texlive-seminar is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661568" comment="texlive-seminar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661569" comment="texlive-sepnum is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661570" comment="texlive-sepnum is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661571" comment="texlive-setspace is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661572" comment="texlive-setspace is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661573" comment="texlive-showexpl is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661574" comment="texlive-showexpl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661575" comment="texlive-soul is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661576" comment="texlive-soul is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661577" comment="texlive-stackengine is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661578" comment="texlive-stackengine is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661579" comment="texlive-stmaryrd is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661580" comment="texlive-stmaryrd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661581" comment="texlive-stringenc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661582" comment="texlive-stringenc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661583" comment="texlive-subfig is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661584" comment="texlive-subfig is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661585" comment="texlive-subfigure is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661586" comment="texlive-subfigure is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661587" comment="texlive-svn-prov is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661588" comment="texlive-svn-prov is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661589" comment="texlive-symbol is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661590" comment="texlive-symbol is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661591" comment="texlive-t2 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661592" comment="texlive-t2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661593" comment="texlive-tabu is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661594" comment="texlive-tabu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661595" comment="texlive-tabulary is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661596" comment="texlive-tabulary is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661599" comment="texlive-tex-gyre is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661600" comment="texlive-tex-gyre is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661601" comment="texlive-tex-gyre-math is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661602" comment="texlive-tex-gyre-math is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661603" comment="texlive-tex-ini-files is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661604" comment="texlive-tex-ini-files is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661607" comment="texlive-texlive-common-doc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661608" comment="texlive-texlive-common-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661609" comment="texlive-texlive-docindex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661610" comment="texlive-texlive-docindex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661611" comment="texlive-texlive-en is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661612" comment="texlive-texlive-en is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661613" comment="texlive-texlive-msg-translations is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661614" comment="texlive-texlive-msg-translations is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661615" comment="texlive-texlive-scripts is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661616" comment="texlive-texlive-scripts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661617" comment="texlive-texlive-scripts-extra is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661618" comment="texlive-texlive-scripts-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661619" comment="texlive-texlive.infra is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661620" comment="texlive-texlive.infra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661621" comment="texlive-textcase is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661622" comment="texlive-textcase is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661623" comment="texlive-textpos is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661624" comment="texlive-textpos is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661625" comment="texlive-threeparttable is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661626" comment="texlive-threeparttable is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661627" comment="texlive-thumbpdf is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661628" comment="texlive-thumbpdf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661629" comment="texlive-times is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661630" comment="texlive-times is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661631" comment="texlive-tipa is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661632" comment="texlive-tipa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661633" comment="texlive-titlesec is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661634" comment="texlive-titlesec is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661635" comment="texlive-titling is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661636" comment="texlive-titling is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661637" comment="texlive-tocloft is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661638" comment="texlive-tocloft is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661639" comment="texlive-tools is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661640" comment="texlive-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661641" comment="texlive-translator is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661642" comment="texlive-translator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661643" comment="texlive-trimspaces is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661644" comment="texlive-trimspaces is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661645" comment="texlive-txfonts is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661646" comment="texlive-txfonts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661647" comment="texlive-type1cm is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661648" comment="texlive-type1cm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661649" comment="texlive-typehtml is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661650" comment="texlive-typehtml is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661651" comment="texlive-ucharcat is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661652" comment="texlive-ucharcat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661653" comment="texlive-ucharclasses is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661654" comment="texlive-ucharclasses is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661655" comment="texlive-ucs is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661656" comment="texlive-ucs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661657" comment="texlive-uhc is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661658" comment="texlive-uhc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661659" comment="texlive-ulem is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661660" comment="texlive-ulem is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661661" comment="texlive-underscore is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661662" comment="texlive-underscore is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661663" comment="texlive-unicode-data is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661664" comment="texlive-unicode-data is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661665" comment="texlive-unicode-math is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661666" comment="texlive-unicode-math is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661667" comment="texlive-uniquecounter is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661668" comment="texlive-uniquecounter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661669" comment="texlive-unisugar is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661670" comment="texlive-unisugar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661671" comment="texlive-updmap-map is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661672" comment="texlive-updmap-map is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661673" comment="texlive-upquote is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661674" comment="texlive-upquote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661675" comment="texlive-url is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661676" comment="texlive-url is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661677" comment="texlive-utopia is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661678" comment="texlive-utopia is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661679" comment="texlive-varwidth is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661680" comment="texlive-varwidth is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661681" comment="texlive-wadalab is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661682" comment="texlive-wadalab is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661683" comment="texlive-was is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661684" comment="texlive-was is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661685" comment="texlive-wasy is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661686" comment="texlive-wasy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661687" comment="texlive-wasy-type1 is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661688" comment="texlive-wasy-type1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661689" comment="texlive-wasysym is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661690" comment="texlive-wasysym is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661691" comment="texlive-wrapfig is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661692" comment="texlive-wrapfig is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661693" comment="texlive-xcolor is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661694" comment="texlive-xcolor is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661697" comment="texlive-xecjk is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661698" comment="texlive-xecjk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661699" comment="texlive-xecolor is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661700" comment="texlive-xecolor is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661701" comment="texlive-xecyr is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661702" comment="texlive-xecyr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661703" comment="texlive-xeindex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661704" comment="texlive-xeindex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661705" comment="texlive-xepersian is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661706" comment="texlive-xepersian is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661707" comment="texlive-xesearch is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661708" comment="texlive-xesearch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661711" comment="texlive-xetex-itrans is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661712" comment="texlive-xetex-itrans is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661713" comment="texlive-xetex-pstricks is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661714" comment="texlive-xetex-pstricks is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661715" comment="texlive-xetex-tibetan is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661716" comment="texlive-xetex-tibetan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661717" comment="texlive-xetexconfig is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661718" comment="texlive-xetexconfig is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661719" comment="texlive-xetexfontinfo is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661720" comment="texlive-xetexfontinfo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661721" comment="texlive-xifthen is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661722" comment="texlive-xifthen is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661723" comment="texlive-xkeyval is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661724" comment="texlive-xkeyval is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661725" comment="texlive-xltxtra is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661726" comment="texlive-xltxtra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661727" comment="texlive-xmltex is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661728" comment="texlive-xmltex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661729" comment="texlive-xmltexconfig is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661730" comment="texlive-xmltexconfig is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661731" comment="texlive-xstring is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661732" comment="texlive-xstring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661733" comment="texlive-xtab is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661734" comment="texlive-xtab is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661735" comment="texlive-xunicode is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661736" comment="texlive-xunicode is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661737" comment="texlive-zapfchan is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661738" comment="texlive-zapfchan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661739" comment="texlive-zapfding is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661740" comment="texlive-zapfding is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661741" comment="texlive-zref is earlier than 9:20200406-26.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233661742" comment="texlive-zref is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233708" version="642" class="patch">
      <metadata>
        <title>ALSA-2023:3708: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:3708" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3708"/>
        <reference ref_id="CVE-2023-2002" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2002"/>
        <reference ref_id="CVE-2023-2124" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2124"/>
        <reference ref_id="CVE-2023-2194" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2194"/>
        <reference ref_id="CVE-2023-2235" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2235"/>
        <reference ref_id="CVE-2023-28466" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28466"/>
        <reference ref_id="CVE-2023-32233" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32233"/>
        <reference ref_id="ALSA-2023:3708" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3708.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
* Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002)
* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [RT] Single Node Openshift cluster becomes unreachable after running less than 2 hours (BZ#2186853)
* kernel-rt: update RT source tree to the latest AlmaLinux-9.2.z1 Batch (BZ#2188313)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-21"/>
          <updated date="2023-06-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179000" id="2179000"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187308" id="2187308"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187439" id="2187439"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188396" id="2188396"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2192589" id="2192589"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196105" id="2196105"></bugzilla>
          <cve public="20230416" href="https://access.redhat.com/security/cve/CVE-2023-2002" impact="Moderate" cwe="CWE-250" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2023-2002</cve>
          <cve public="20230412" href="https://access.redhat.com/security/cve/CVE-2023-2124" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2124</cve>
          <cve public="20230316" href="https://access.redhat.com/security/cve/CVE-2023-2194" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2194</cve>
          <cve public="20230315" href="https://access.redhat.com/security/cve/CVE-2023-2235" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2235</cve>
          <cve public="20230315" href="https://access.redhat.com/security/cve/CVE-2023-28466" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-28466</cve>
          <cve public="20230502" href="https://access.redhat.com/security/cve/CVE-2023-32233" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-32233</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708028" comment="kernel-rt is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708029" comment="kernel-rt-core is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708030" comment="kernel-rt-debug is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708031" comment="kernel-rt-debug-core is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708032" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708033" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708034" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708035" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708036" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708037" comment="kernel-rt-devel is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708038" comment="kernel-rt-kvm is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708039" comment="kernel-rt-modules is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708040" comment="kernel-rt-modules-core is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233708041" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-284.18.1.rt14.303.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233714" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3714: postgresql security update (Moderate)</title>
        <reference ref_id="RHSA-2023:3714" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3714"/>
        <reference ref_id="CVE-2023-2454" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2454"/>
        <reference ref_id="CVE-2023-2455" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2455"/>
        <reference ref_id="ALSA-2023:3714" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3714.html"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

* postgresql: schema_element defeats protective search_path changes (CVE-2023-2454)
* postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-21"/>
          <updated date="2023-06-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2207568" id="2207568"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2207569" id="2207569"></bugzilla>
          <cve public="20230511" href="https://access.redhat.com/security/cve/CVE-2023-2454" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2454</cve>
          <cve public="20230511" href="https://access.redhat.com/security/cve/CVE-2023-2455" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2023-2455</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714001" comment="postgresql is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771002" comment="postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714003" comment="postgresql-contrib is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771004" comment="postgresql-contrib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714005" comment="postgresql-docs is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693006" comment="postgresql-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714007" comment="postgresql-plperl is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771006" comment="postgresql-plperl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714009" comment="postgresql-plpython3 is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771008" comment="postgresql-plpython3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714011" comment="postgresql-pltcl is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771010" comment="postgresql-pltcl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714013" comment="postgresql-private-devel is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771012" comment="postgresql-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714015" comment="postgresql-private-libs is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771014" comment="postgresql-private-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714017" comment="postgresql-server is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771016" comment="postgresql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714019" comment="postgresql-server-devel is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771018" comment="postgresql-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714021" comment="postgresql-static is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693022" comment="postgresql-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714023" comment="postgresql-test is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771020" comment="postgresql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714025" comment="postgresql-upgrade is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771022" comment="postgresql-upgrade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233714027" comment="postgresql-upgrade-devel is earlier than 0:13.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693028" comment="postgresql-upgrade-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233715" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3715: libvirt security update (Moderate)</title>
        <reference ref_id="RHSA-2023:3715" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3715"/>
        <reference ref_id="CVE-2023-2700" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2700"/>
        <reference ref_id="ALSA-2023:3715" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3715.html"/>
        <description>The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

Security Fix(es):

* libvirt: Memory leak in virPCIVirtualFunctionList cleanup (CVE-2023-2700)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-21"/>
          <updated date="2023-06-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2203653" id="2203653"></bugzilla>
          <cve public="20230515" href="https://access.redhat.com/security/cve/CVE-2023-2700" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2023-2700</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715001" comment="libvirt is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757063" comment="libvirt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715003" comment="libvirt-client is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757065" comment="libvirt-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715052" comment="libvirt-client-qemu is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757067" comment="libvirt-client-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715007" comment="libvirt-daemon is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757069" comment="libvirt-daemon is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715009" comment="libvirt-daemon-config-network is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757073" comment="libvirt-daemon-config-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715011" comment="libvirt-daemon-config-nwfilter is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757075" comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715013" comment="libvirt-daemon-driver-interface is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757077" comment="libvirt-daemon-driver-interface is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715015" comment="libvirt-daemon-driver-network is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757079" comment="libvirt-daemon-driver-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715017" comment="libvirt-daemon-driver-nodedev is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757081" comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715019" comment="libvirt-daemon-driver-nwfilter is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757083" comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715053" comment="libvirt-daemon-driver-qemu is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757085" comment="libvirt-daemon-driver-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715023" comment="libvirt-daemon-driver-secret is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757087" comment="libvirt-daemon-driver-secret is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715025" comment="libvirt-daemon-driver-storage is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757089" comment="libvirt-daemon-driver-storage is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715027" comment="libvirt-daemon-driver-storage-core is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757091" comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715029" comment="libvirt-daemon-driver-storage-disk is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757093" comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715031" comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757095" comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715033" comment="libvirt-daemon-driver-storage-logical is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757097" comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715035" comment="libvirt-daemon-driver-storage-mpath is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757099" comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715037" comment="libvirt-daemon-driver-storage-rbd is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757101" comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715039" comment="libvirt-daemon-driver-storage-scsi is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757103" comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715054" comment="libvirt-daemon-kvm is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757105" comment="libvirt-daemon-kvm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715043" comment="libvirt-devel is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757117" comment="libvirt-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715045" comment="libvirt-docs is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757119" comment="libvirt-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715047" comment="libvirt-libs is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757121" comment="libvirt-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715055" comment="libvirt-lock-sanlock is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228003048" comment="libvirt-lock-sanlock is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233715051" comment="libvirt-nss is earlier than 0:9.0.0-10.2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757123" comment="libvirt-nss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233722" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:3722: openssl security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:3722" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3722"/>
        <reference ref_id="CVE-2023-0464" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0464"/>
        <reference ref_id="CVE-2023-0465" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0465"/>
        <reference ref_id="CVE-2023-0466" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0466"/>
        <reference ref_id="CVE-2023-1255" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1255"/>
        <reference ref_id="CVE-2023-2650" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2650"/>
        <reference ref_id="ALSA-2023:3722" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3722.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: Possible DoS translating ASN.1 object identifiers (CVE-2023-2650)
* openssl: Denial of service by excessive resource usage in verifying X509 policy constraints (CVE-2023-0464)
* openssl: Invalid certificate policies in leaf certificates are silently ignored (CVE-2023-0465)
* openssl: Certificate policy check not enabled (CVE-2023-0466)
* openssl: Input buffer over-read in AES-XTS implementation on 64 bit ARM (CVE-2023-1255)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* In FIPS mode, openssl KDFs should only allow selected hash algorithms (BZ#2175860)
* In FIPS mode, openssl should reject short KDF input or output keys or provide an indicator (BZ#2175864)
* In FIPS mode, openssl should provide an indicator for AES-GCM to query whether the IV was generated internally or provided externally (BZ#2175868)
* openssl FIPS mode self-test should zeroize `out` in `verify_integrity` in providers/fips/self_test.c (BZ#2175873)
* In FIPS mode, openssl should not support RSA encryption or decryption without padding (outside of RSASVE) or provide an indicator (BZ#2178029)
* In FIPS mode, openssl should reject EVP_PKEY_fromdata() for short DHX keys, or provide an indicator (BZ#2178030)
* In FIPS mode, openssl should not use the legacy ECDSA_do_sign(), RSA_public_encrypt(), RSA_private_decrypt() functions for pairwise consistency tests (BZ#2178034)
* In FIPS mode, openssl should enter error state when DH PCT fails (BZ#2178039)
* In FIPS mode, openssl should always run the PBKDF2 lower bounds checks or provide an indicator when the pkcs5 parameter is set to 1 (BZ#2178137)
* Support requiring EMS in TLS 1.2, default to it when in FIPS mode (BZ#2188046)
* OpenSSL rsa_verify_recover doesn't use the same key checks as rsa_verify in FIPS mode (BZ#2188052)
* AlmaLinux9.0 - sshd dumps core when ibmca engine is configured with default_algorithms = CIPHERS or ALL (openssl) (BZ#2211396)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-21"/>
          <updated date="2023-06-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2181082" id="2181082"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2182561" id="2182561"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2182565" id="2182565"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188461" id="2188461"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2207947" id="2207947"></bugzilla>
          <cve public="20230322" href="https://access.redhat.com/security/cve/CVE-2023-0464" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0464</cve>
          <cve public="20230328" href="https://access.redhat.com/security/cve/CVE-2023-0465" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-0465</cve>
          <cve public="20230328" href="https://access.redhat.com/security/cve/CVE-2023-0466" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-0466</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-1255" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-1255</cve>
          <cve public="20230530" href="https://access.redhat.com/security/cve/CVE-2023-2650" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-2650</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233722001" comment="openssl is earlier than 1:3.0.7-16.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233722008" comment="openssl-devel is earlier than 1:3.0.7-16.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233722009" comment="openssl-libs is earlier than 1:3.0.7-16.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233722007" comment="openssl-perl is earlier than 1:3.0.7-16.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233723" version="643" class="patch">
      <metadata>
        <title>ALSA-2023:3723: kernel security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:3723" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3723"/>
        <reference ref_id="CVE-2023-2002" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2002"/>
        <reference ref_id="CVE-2023-2124" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2124"/>
        <reference ref_id="CVE-2023-2194" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2194"/>
        <reference ref_id="CVE-2023-2235" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2235"/>
        <reference ref_id="CVE-2023-28466" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28466"/>
        <reference ref_id="CVE-2023-32233" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32233"/>
        <reference ref_id="ALSA-2023:3723" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3723.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
* Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002)
* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Intel QAT Update - (kernel changes) (BZ#2176846)
* RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2178857)
* In FIPS mode, kernel does not transition into error state when RCT or APT health tests fail (BZ#2181727)
* Kernel BUG in iwlmvm wifi driver when used Mesh systems (BZ#2186723)
* Azure AlmaLinux 9 Backport upstream commit 93827a0a36396f2fd6368a54a020f420c8916e9b [KVM: VMX: Fix crash due to uninitialized current_vmcs] (BZ#2186822)
* AlmaLinux 9 blktests nvme/047 lead kernel NULL pointer (BZ#2187536)
* Single Node Openshift cluster becomes unreachable after running less than 2 hours (BZ#2187709)
* kernel[-rt]: task deadline_test:1778 blocked for more than 622 seconds (BZ#2188655)
* fix page end in filemap_get_read_batch (BZ#2189349)
* AlmaLinux 9.2 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2192348)
* wdat_wdt watchdog timeout triggered unexpectedly (BZ#2192585)
* ice: high CPU usage with GNSS or ptp4l (BZ#2203154)
* AlmaLinux 9 "smpboot: Scheduler frequency invariance went wobbly, disabling!" on nohz_full CPUs after long run (BZ#2203178)
* Dying percpu kworkers cause issues on isolated CPUs [almalinux-9] (BZ#2203229)
* FJ9.2 Bug: [REG] NFS infinite loop of COMMIT call and NFS4ERR_DELAY reply. (BZ#2203335)
* perf errors - "event syntax error: 'unc_p_delayed_c_state_abort_core5'" b'_ value too big for format, maximum is 255' (BZ#2207471)
* AlmaLinux 9: Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208242)
* cifs: backport small patches to bring us close to 9.1 - backport commit aea02fc40a7f cifs: fix wrong unlock before return from cifs_tree_connect (BZ#2209045)
* AlmaLinux 9 x86_64, kdump 2nd kernel will randomly panic on "kvm-08-guest25.hv2" (BZ#2210614)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-21"/>
          <updated date="2023-06-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179000" id="2179000"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187308" id="2187308"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187439" id="2187439"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188396" id="2188396"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2192589" id="2192589"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196105" id="2196105"></bugzilla>
          <cve public="20230416" href="https://access.redhat.com/security/cve/CVE-2023-2002" impact="Moderate" cwe="CWE-250" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2023-2002</cve>
          <cve public="20230412" href="https://access.redhat.com/security/cve/CVE-2023-2124" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2124</cve>
          <cve public="20230316" href="https://access.redhat.com/security/cve/CVE-2023-2194" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2194</cve>
          <cve public="20230315" href="https://access.redhat.com/security/cve/CVE-2023-2235" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-2235</cve>
          <cve public="20230315" href="https://access.redhat.com/security/cve/CVE-2023-28466" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-28466</cve>
          <cve public="20230502" href="https://access.redhat.com/security/cve/CVE-2023-32233" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-32233</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723001" comment="bpftool is earlier than 0:7.0.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723003" comment="kernel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723090" comment="kernel-64k is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723091" comment="kernel-64k-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723092" comment="kernel-64k-debug is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723093" comment="kernel-64k-debug-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723094" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723095" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723096" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723097" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723098" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723099" comment="kernel-64k-devel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723100" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723101" comment="kernel-64k-modules is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723102" comment="kernel-64k-modules-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723103" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723035" comment="kernel-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723037" comment="kernel-debug is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723039" comment="kernel-debug-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723041" comment="kernel-debug-devel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723043" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723045" comment="kernel-debug-modules is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723047" comment="kernel-debug-modules-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723049" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723104" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723053" comment="kernel-devel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723055" comment="kernel-devel-matched is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723057" comment="kernel-modules is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723105" comment="kernel-modules-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723061" comment="kernel-modules-extra is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723063" comment="kernel-tools is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723106" comment="kernel-tools-libs is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723107" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723108" comment="kernel-uki-virt is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723109" comment="kernel-zfcpdump is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723110" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723111" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723112" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723113" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723114" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723115" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723085" comment="perf is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723087" comment="python3-perf is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723116" comment="rtla is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233723033" comment="kernel-abi-stablelists is earlier than 0:5.14.0-284.18.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233923" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:3923: go-toolset and golang security update (Critical)</title>
        <reference ref_id="RHSA-2023:3923" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3923"/>
        <reference ref_id="CVE-2023-29402" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29402"/>
        <reference ref_id="CVE-2023-29403" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29403"/>
        <reference ref_id="CVE-2023-29404" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29404"/>
        <reference ref_id="CVE-2023-29405" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29405"/>
        <reference ref_id="ALSA-2023:3923" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3923.html"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. 

The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402)
* golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404)
* golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405)
* golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-29"/>
          <updated date="2023-06-29"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2216965" id="2216965"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2217562" id="2217562"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2217565" id="2217565"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2217569" id="2217569"></bugzilla>
          <cve public="20230608" href="https://access.redhat.com/security/cve/CVE-2023-29402" impact="Critical" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-29402</cve>
          <cve public="20230608" href="https://access.redhat.com/security/cve/CVE-2023-29403" impact="Important" cwe="CWE-668" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-29403</cve>
          <cve public="20230608" href="https://access.redhat.com/security/cve/CVE-2023-29404" impact="Critical" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-29404</cve>
          <cve public="20230608" href="https://access.redhat.com/security/cve/CVE-2023-29405" impact="Critical" cwe="CWE-74" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-29405</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923016" comment="golang is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923017" comment="golang-bin is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923018" comment="golang-race is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799010" comment="golang-race is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923019" comment="go-toolset is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923020" comment="golang-docs is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923021" comment="golang-misc is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923022" comment="golang-src is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233923023" comment="golang-tests is earlier than 0:1.19.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20233948" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:3948: open-vm-tools security update (Low)</title>
        <reference ref_id="RHSA-2023:3948" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:3948"/>
        <reference ref_id="CVE-2023-20867" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-20867"/>
        <reference ref_id="ALSA-2023:3948" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-3948.html"/>
        <description>The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.

Security Fix(es):

* open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-06-29"/>
          <updated date="2023-06-29"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2213087" id="2213087"></bugzilla>
          <cve public="20230613" href="https://access.redhat.com/security/cve/CVE-2023-20867" impact="Low" cwe="CWE-287" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N">CVE-2023-20867</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948010" comment="open-vm-tools is earlier than 0:12.1.5-1.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358002" comment="open-vm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948011" comment="open-vm-tools-desktop is earlier than 0:12.1.5-1.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358004" comment="open-vm-tools-desktop is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948012" comment="open-vm-tools-salt-minion is earlier than 0:12.1.5-1.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948006" comment="open-vm-tools-salt-minion is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948013" comment="open-vm-tools-sdmp is earlier than 0:12.1.5-1.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358006" comment="open-vm-tools-sdmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948014" comment="open-vm-tools-test is earlier than 0:12.1.5-1.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358008" comment="open-vm-tools-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234057" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:4057: .NET 7.0 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:4057" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4057"/>
        <reference ref_id="CVE-2023-33170" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-33170"/>
        <reference ref_id="ALSA-2023:4057" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4057.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

The following packages have been upgraded to a later upstream version: dotnet7.0 (SDK 7.0.109, Runtime 7.0.9). (BZ#2219634)

Security Fix(es):

* dotnet: race condition in Core SignInManager&lt;TUser&gt; PasswordSignInAsync method (CVE-2023-33170)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-13"/>
          <updated date="2023-07-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2221854" id="2221854"></bugzilla>
          <cve public="20230711" href="https://access.redhat.com/security/cve/CVE-2023-33170" impact="Important" cwe="CWE-362" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-33170</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057007" comment="dotnet-host is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.109-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.109-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.9-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057019" comment="dotnet-templates-7.0 is earlier than 0:7.0.109-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234057021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.109-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234060" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:4060: .NET 6.0 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:4060" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4060"/>
        <reference ref_id="CVE-2023-33170" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-33170"/>
        <reference ref_id="ALSA-2023:4060" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4060.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

The following packages have been upgraded to a later upstream version: dotnet6.0 (SDK 6.0.120, Runtime 6.0.20). (BZ#2219640)

Security Fix(es):

* dotnet: race condition in Core SignInManager&lt;TUser&gt; PasswordSignInAsync method (CVE-2023-33170)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-13"/>
          <updated date="2023-07-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2221854" id="2221854"></bugzilla>
          <cve public="20230711" href="https://access.redhat.com/security/cve/CVE-2023-33170" impact="Important" cwe="CWE-362" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-33170</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.20-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.20-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.20-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.20-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.20-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.120-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.120-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.20-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234060017" comment="dotnet-templates-6.0 is earlier than 0:6.0.120-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234071" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4071: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:4071" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4071"/>
        <reference ref_id="CVE-2023-37201" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37201"/>
        <reference ref_id="CVE-2023-37202" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37202"/>
        <reference ref_id="CVE-2023-37207" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37207"/>
        <reference ref_id="CVE-2023-37208" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37208"/>
        <reference ref_id="CVE-2023-37211" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37211"/>
        <reference ref_id="ALSA-2023:4071" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4071.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.13.0 ESR.

Security Fix(es):

* Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202)
* Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211)
* Mozilla: Fullscreen notification obscured (CVE-2023-37207)
* Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-13"/>
          <updated date="2023-07-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2219747" id="2219747"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219748" id="2219748"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219749" id="2219749"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219750" id="2219750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219751" id="2219751"></bugzilla>
          <cve public="20230704" href="https://access.redhat.com/security/cve/CVE-2023-37201" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-37201</cve>
          <cve public="20230704" href="https://access.redhat.com/security/cve/CVE-2023-37202" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-37202</cve>
          <cve public="20230704" href="https://access.redhat.com/security/cve/CVE-2023-37207" impact="Moderate" cwe="CWE-290" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-37207</cve>
          <cve public="20230704" href="https://access.redhat.com/security/cve/CVE-2023-37208" impact="Moderate" cwe="CWE-1127" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-37208</cve>
          <cve public="20230704" href="https://access.redhat.com/security/cve/CVE-2023-37211" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-37211</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234071004" comment="firefox is earlier than 0:102.13.0-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234071005" comment="firefox-x11 is earlier than 0:102.13.0-2.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241501" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1501: grafana security update (Important)</title>
        <reference ref_id="RHSA-2024:1501" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1501"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:1501" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1501.html"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB.

Security Fix(es):

* grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-25"/>
          <updated date="2024-03-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20241501002" comment="grafana is earlier than 0:9.2.10-8.el9_3.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20225716002" comment="grafana is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234099" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4099: bind security update (Important)</title>
        <reference ref_id="RHSA-2023:4099" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4099"/>
        <reference ref_id="CVE-2023-2828" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2828"/>
        <reference ref_id="ALSA-2023:4099" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4099.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-17"/>
          <updated date="2023-07-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2216227" id="2216227"></bugzilla>
          <cve public="20230621" href="https://access.redhat.com/security/cve/CVE-2023-2828" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-2828</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099001" comment="bind is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099003" comment="bind-chroot is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099020" comment="bind-devel is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099009" comment="bind-dnssec-utils is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099021" comment="bind-libs is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099017" comment="bind-utils is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099007" comment="bind-dnssec-doc is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099011" comment="bind-doc is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068012" comment="bind-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099015" comment="bind-license is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234099019" comment="python3-bind is earlier than 32:9.16.23-11.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234158" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4158: java-11-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:4158" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4158"/>
        <reference ref_id="CVE-2023-22006" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22006"/>
        <reference ref_id="CVE-2023-22036" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22036"/>
        <reference ref_id="CVE-2023-22041" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22041"/>
        <reference ref_id="CVE-2023-22045" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22045"/>
        <reference ref_id="CVE-2023-22049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22049"/>
        <reference ref_id="CVE-2023-25193" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25193"/>
        <reference ref_id="ALSA-2023:4158" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4158.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036)
* OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041)
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)
* harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193)
* OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006)
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20) [almalinux-9] (BZ#2223100)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-20"/>
          <updated date="2023-07-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2167254" id="2167254"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221626" id="2221626"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221634" id="2221634"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221645" id="2221645"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221647" id="2221647"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2223207" id="2223207"></bugzilla>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22006" impact="Low" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2023-22006</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22036" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-22036</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22041" impact="Moderate" cwe="CWE-334" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-22041</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22045" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-22045</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22049" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22049</cve>
          <cve public="20230204" href="https://access.redhat.com/security/cve/CVE-2023-25193" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-25193</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158001" comment="java-11-openjdk is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158003" comment="java-11-openjdk-demo is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158009" comment="java-11-openjdk-devel is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158017" comment="java-11-openjdk-headless is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158027" comment="java-11-openjdk-jmods is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158035" comment="java-11-openjdk-src is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234158045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.20.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234177" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4177: java-17-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:4177" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4177"/>
        <reference ref_id="CVE-2023-22006" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22006"/>
        <reference ref_id="CVE-2023-22036" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22036"/>
        <reference ref_id="CVE-2023-22041" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22041"/>
        <reference ref_id="CVE-2023-22044" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22044"/>
        <reference ref_id="CVE-2023-22045" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22045"/>
        <reference ref_id="CVE-2023-22049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22049"/>
        <reference ref_id="CVE-2023-25193" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25193"/>
        <reference ref_id="ALSA-2023:4177" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4177.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036)
* OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041)
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)
* harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193)
* OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006)
* OpenJDK: modulo operator array indexing issue (8304460) (CVE-2023-22044)
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Installing the same java-17-openjdk-headless package on two different systems resulted in distinct classes.jsa files getting generated. This was because the CDS archive was being generated by a post script action of the java-17-openjdk-headless package. This prevented the use of the dynamic dump feature, as the checksum in the archive would be different on each system. This is resolved in this release by using the .jsa files generated during the initial build. (RHBZ#2221653)
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 17.0.8) [almalinux-9] (BZ#2222852)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-20"/>
          <updated date="2023-07-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2167254" id="2167254"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221626" id="2221626"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221634" id="2221634"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221642" id="2221642"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221645" id="2221645"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221647" id="2221647"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2223207" id="2223207"></bugzilla>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22006" impact="Low" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2023-22006</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22036" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-22036</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22041" impact="Moderate" cwe="CWE-334" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-22041</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22044" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-22044</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22045" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-22045</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22049" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22049</cve>
          <cve public="20230204" href="https://access.redhat.com/security/cve/CVE-2023-25193" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-25193</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177001" comment="java-17-openjdk is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177003" comment="java-17-openjdk-demo is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177009" comment="java-17-openjdk-devel is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177017" comment="java-17-openjdk-headless is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177027" comment="java-17-openjdk-jmods is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177035" comment="java-17-openjdk-src is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234177045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.8.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234178" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4178: java-1.8.0-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:4178" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4178"/>
        <reference ref_id="CVE-2023-22045" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22045"/>
        <reference ref_id="CVE-2023-22049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22049"/>
        <reference ref_id="ALSA-2023:4178" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4178.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [almalinux-9] (BZ#2220662)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-20"/>
          <updated date="2023-07-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2221645" id="2221645"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221647" id="2221647"></bugzilla>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22045" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-22045</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22049" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22049</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234178025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.382.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234201" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:4201: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:4201" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4201"/>
        <reference ref_id="CVE-2023-32435" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32435"/>
        <reference ref_id="CVE-2023-32439" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32439"/>
        <reference ref_id="ALSA-2023:4201" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4201.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-18"/>
          <updated date="2023-07-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2218626" id="2218626"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2218640" id="2218640"></bugzilla>
          <cve public="20230629" href="https://access.redhat.com/security/cve/CVE-2023-32435" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32435</cve>
          <cve public="20230629" href="https://access.redhat.com/security/cve/CVE-2023-32439" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32439</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234201001" comment="webkit2gtk3 is earlier than 0:2.38.5-1.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234201003" comment="webkit2gtk3-devel is earlier than 0:2.38.5-1.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234201005" comment="webkit2gtk3-jsc is earlier than 0:2.38.5-1.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234201007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.38.5-1.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234325" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4325: samba security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:4325" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4325"/>
        <reference ref_id="CVE-2023-3347" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3347"/>
        <reference ref_id="ALSA-2023:4325" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4325.html"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

Security Fix(es):

* samba: SMB2 packet signing is not enforced when "server signing = required" is set (CVE-2023-3347)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* The trust relationship between this workstation and the primary domain failed (BZ#2223600)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-31"/>
          <updated date="2023-07-31"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222792" id="2222792"></bugzilla>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-3347" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-3347</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325068" comment="ctdb is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317002" comment="ctdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325069" comment="libnetapi is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519004" comment="libnetapi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325070" comment="libnetapi-devel is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519006" comment="libnetapi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325071" comment="libsmbclient is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317004" comment="libsmbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325072" comment="libsmbclient-devel is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317006" comment="libsmbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325073" comment="libwbclient is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317008" comment="libwbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325074" comment="libwbclient-devel is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317010" comment="libwbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325075" comment="python3-samba is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317012" comment="python3-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325076" comment="python3-samba-dc is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519018" comment="python3-samba-dc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325077" comment="python3-samba-devel is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519020" comment="python3-samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325078" comment="python3-samba-test is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519022" comment="python3-samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325079" comment="samba is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317014" comment="samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325080" comment="samba-client is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317016" comment="samba-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325081" comment="samba-client-libs is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317018" comment="samba-client-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325082" comment="samba-common-libs is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317022" comment="samba-common-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325083" comment="samba-common-tools is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317024" comment="samba-common-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325084" comment="samba-dc-libs is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519036" comment="samba-dc-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325085" comment="samba-dcerpc is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519038" comment="samba-dcerpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325086" comment="samba-devel is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317026" comment="samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325087" comment="samba-krb5-printing is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317028" comment="samba-krb5-printing is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325088" comment="samba-ldb-ldap-modules is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519044" comment="samba-ldb-ldap-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325089" comment="samba-libs is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317030" comment="samba-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325090" comment="samba-test is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317034" comment="samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325091" comment="samba-test-libs is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317036" comment="samba-test-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325092" comment="samba-tools is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519054" comment="samba-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325093" comment="samba-usershares is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519056" comment="samba-usershares is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325094" comment="samba-vfs-iouring is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317038" comment="samba-vfs-iouring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325095" comment="samba-winbind is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317040" comment="samba-winbind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325096" comment="samba-winbind-clients is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317042" comment="samba-winbind-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325097" comment="samba-winbind-krb5-locator is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317044" comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325098" comment="samba-winbind-modules is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317046" comment="samba-winbind-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325099" comment="samba-winexe is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317048" comment="samba-winexe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325100" comment="samba-common is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317020" comment="samba-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234325101" comment="samba-pidl is earlier than 0:4.17.5-103.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317032" comment="samba-pidl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249423" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9423: python-dns security update (Moderate)</title>
        <reference ref_id="CVE-2023-29483" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29483"/>
        <reference ref_id="RHSA-2024:9423" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9423"/>
        <reference ref_id="ALSA-2024:9423" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9423.html"/>
        <description>The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode.  

Security Fix(es):  

  * dnspython: denial of service in stub resolver (CVE-2023-29483)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2274520" id="2274520"></bugzilla>
          <cve public="20240209" href="https://access.redhat.com/security/cve/CVE-2023-29483" impact="Moderate" cwe="CWE-696" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-29483</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249423001" comment="python3-dns is earlier than 0:2.6.1-3.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249423002" comment="python3-dns is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249430" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9430: nano security update (Low)</title>
        <reference ref_id="CVE-2024-5742" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5742"/>
        <reference ref_id="RHSA-2024:9430" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9430"/>
        <reference ref_id="ALSA-2024:9430" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9430.html"/>
        <description>GNU nano is a small and friendly text editor.  

Security Fix(es):  

  * nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2278574" id="2278574"></bugzilla>
          <cve public="20240428" href="https://access.redhat.com/security/cve/CVE-2024-5742" impact="Low" cwe="CWE-377" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N">CVE-2024-5742</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249430001" comment="nano is earlier than 0:5.6.1-6.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249430002" comment="nano is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234331" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:4331: nodejs security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:4331" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4331"/>
        <reference ref_id="CVE-2023-30581" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-30581"/>
        <reference ref_id="CVE-2023-30588" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-30588"/>
        <reference ref_id="CVE-2023-30589" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-30589"/>
        <reference ref_id="CVE-2023-30590" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-30590"/>
        <reference ref_id="ALSA-2023:4331" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4331.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

The package has been upgraded to a later upstream version: nodejs (16.20.1). (BZ#2223334, BZ#2223336, BZ#2223338, BZ#2223340, BZ#2223342, BZ#2223344)

Security Fix(es):

* nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581)
* nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588)
* nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589)
* nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-07-31"/>
          <updated date="2023-07-31"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2219824" id="2219824"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219838" id="2219838"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219841" id="2219841"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219842" id="2219842"></bugzilla>
          <cve public="20230620" href="https://access.redhat.com/security/cve/CVE-2023-30581" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-30581</cve>
          <cve public="20230620" href="https://access.redhat.com/security/cve/CVE-2023-30588" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-30588</cve>
          <cve public="20230620" href="https://access.redhat.com/security/cve/CVE-2023-30589" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-30589</cve>
          <cve public="20230620" href="https://access.redhat.com/security/cve/CVE-2023-30590" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-30590</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234331001" comment="nodejs is earlier than 1:16.20.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234331005" comment="nodejs-full-i18n is earlier than 1:16.20.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234331010" comment="nodejs-libs is earlier than 1:16.20.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234331009" comment="npm is earlier than 1:8.19.4-1.16.20.1.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234331003" comment="nodejs-docs is earlier than 1:16.20.1-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234349" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:4349: libxml2 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:4349" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4349"/>
        <reference ref_id="CVE-2023-28484" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28484"/>
        <reference ref_id="CVE-2023-29469" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29469"/>
        <reference ref_id="ALSA-2023:4349" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4349.html"/>
        <description>The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

* libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484)
* libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-01"/>
          <updated date="2023-08-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2185984" id="2185984"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2185994" id="2185994"></bugzilla>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-28484" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-28484</cve>
          <cve public="20230411" href="https://access.redhat.com/security/cve/CVE-2023-29469" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-29469</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234349001" comment="libxml2 is earlier than 0:2.9.13-3.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250002" comment="libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234349003" comment="libxml2-devel is earlier than 0:2.9.13-3.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250004" comment="libxml2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234349006" comment="python3-libxml2 is earlier than 0:2.9.13-3.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250006" comment="python3-libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234354" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4354: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2023:4354" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4354"/>
        <reference ref_id="CVE-2023-28321" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28321"/>
        <reference ref_id="CVE-2023-28322" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28322"/>
        <reference ref_id="ALSA-2023:4354" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4354.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321)
* curl: more POST-after-PUT confusion (CVE-2023-28322)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-01"/>
          <updated date="2023-08-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2196786" id="2196786"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196793" id="2196793"></bugzilla>
          <cve public="20230517" href="https://access.redhat.com/security/cve/CVE-2023-28321" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-28321</cve>
          <cve public="20230517" href="https://access.redhat.com/security/cve/CVE-2023-28322" impact="Low" cwe="CWE-440" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-28322</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234354001" comment="curl is earlier than 0:7.76.1-23.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234354003" comment="curl-minimal is earlier than 0:7.76.1-23.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234354010" comment="libcurl is earlier than 0:7.76.1-23.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234354011" comment="libcurl-devel is earlier than 0:7.76.1-23.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234354012" comment="libcurl-minimal is earlier than 0:7.76.1-23.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234377" version="646" class="patch">
      <metadata>
        <title>ALSA-2023:4377: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:4377" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4377"/>
        <reference ref_id="CVE-2022-45869" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45869"/>
        <reference ref_id="CVE-2023-0458" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0458"/>
        <reference ref_id="CVE-2023-1998" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1998"/>
        <reference ref_id="CVE-2023-3090" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3090"/>
        <reference ref_id="CVE-2023-35788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35788"/>
        <reference ref_id="ALSA-2023:4377" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4377.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: ipvlan: out-of-bounds write caused by unclear skb-&gt;cb (CVE-2023-3090)
* kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)
* kernel: KVM: x86/mmu: race condition in direct_page_fault() (CVE-2022-45869)
* kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c (CVE-2023-0458)
* kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-01"/>
          <updated date="2023-08-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2151317" id="2151317"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187257" id="2187257"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2193219" id="2193219"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2215768" id="2215768"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2218672" id="2218672"></bugzilla>
          <cve public="20221123" href="https://access.redhat.com/security/cve/CVE-2022-45869" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-45869</cve>
          <cve public="20230121" href="https://access.redhat.com/security/cve/CVE-2023-0458" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-0458</cve>
          <cve public="20230412" href="https://access.redhat.com/security/cve/CVE-2023-1998" impact="Moderate" cwe="CWE-226-&gt;CWE-385-&gt;CWE-200" cvss3="CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-1998</cve>
          <cve public="20230510" href="https://access.redhat.com/security/cve/CVE-2023-3090" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3090</cve>
          <cve public="20230529" href="https://access.redhat.com/security/cve/CVE-2023-35788" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-35788</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377001" comment="bpftool is earlier than 0:7.0.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377003" comment="kernel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377094" comment="kernel-64k is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377095" comment="kernel-64k-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377096" comment="kernel-64k-debug is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377097" comment="kernel-64k-debug-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377098" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377099" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377100" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377101" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377102" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377103" comment="kernel-64k-devel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377104" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377105" comment="kernel-64k-modules is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377106" comment="kernel-64k-modules-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377107" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377035" comment="kernel-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377037" comment="kernel-cross-headers is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377039" comment="kernel-debug is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377041" comment="kernel-debug-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377043" comment="kernel-debug-devel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377045" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377047" comment="kernel-debug-modules is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377049" comment="kernel-debug-modules-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377051" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377108" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377055" comment="kernel-devel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377057" comment="kernel-devel-matched is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377061" comment="kernel-modules is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377109" comment="kernel-modules-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377065" comment="kernel-modules-extra is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377067" comment="kernel-tools is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377110" comment="kernel-tools-libs is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377111" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377112" comment="kernel-uki-virt is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377113" comment="kernel-zfcpdump is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377114" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377115" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377116" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377117" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377118" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377119" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377089" comment="perf is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377091" comment="python3-perf is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377120" comment="rtla is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377033" comment="kernel-abi-stablelists is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234377059" comment="kernel-doc is earlier than 0:5.14.0-284.25.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234378" version="644" class="patch">
      <metadata>
        <title>ALSA-2023:4378: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:4378" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4378"/>
        <reference ref_id="CVE-2022-45869" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-45869"/>
        <reference ref_id="CVE-2023-0458" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0458"/>
        <reference ref_id="CVE-2023-1998" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1998"/>
        <reference ref_id="CVE-2023-3090" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3090"/>
        <reference ref_id="CVE-2023-35788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35788"/>
        <reference ref_id="ALSA-2023:4378" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4378.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: ipvlan: out-of-bounds write caused by unclear skb-&gt;cb (CVE-2023-3090)
* kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)
* kernel: KVM: x86/mmu: race condition in direct_page_fault() (CVE-2022-45869)
* kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c (CVE-2023-0458)
* kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-01"/>
          <updated date="2023-08-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2151317" id="2151317"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2187257" id="2187257"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2193219" id="2193219"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2215768" id="2215768"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2218672" id="2218672"></bugzilla>
          <cve public="20221123" href="https://access.redhat.com/security/cve/CVE-2022-45869" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-45869</cve>
          <cve public="20230121" href="https://access.redhat.com/security/cve/CVE-2023-0458" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-0458</cve>
          <cve public="20230412" href="https://access.redhat.com/security/cve/CVE-2023-1998" impact="Moderate" cwe="CWE-226-&gt;CWE-385-&gt;CWE-200" cvss3="CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-1998</cve>
          <cve public="20230510" href="https://access.redhat.com/security/cve/CVE-2023-3090" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3090</cve>
          <cve public="20230529" href="https://access.redhat.com/security/cve/CVE-2023-35788" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-35788</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378028" comment="kernel-rt is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378029" comment="kernel-rt-core is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378030" comment="kernel-rt-debug is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378031" comment="kernel-rt-debug-core is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378032" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378033" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378034" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378035" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378036" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378037" comment="kernel-rt-devel is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378038" comment="kernel-rt-kvm is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378039" comment="kernel-rt-modules is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378040" comment="kernel-rt-modules-core is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234378041" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-284.25.1.rt14.310.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234412" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4412: openssh security update (Important)</title>
        <reference ref_id="RHSA-2023:4412" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4412"/>
        <reference ref_id="CVE-2023-38408" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38408"/>
        <reference ref_id="ALSA-2023:4412" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4412.html"/>
        <description>OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-01"/>
          <updated date="2023-08-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2224173" id="2224173"></bugzilla>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-38408" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-38408</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234412001" comment="openssh is earlier than 0:8.7p1-30.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645002" comment="openssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234412003" comment="openssh-askpass is earlier than 0:8.7p1-30.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645004" comment="openssh-askpass is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234412005" comment="openssh-clients is earlier than 0:8.7p1-30.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645006" comment="openssh-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234412007" comment="openssh-keycat is earlier than 0:8.7p1-30.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645008" comment="openssh-keycat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234412009" comment="openssh-server is earlier than 0:8.7p1-30.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645010" comment="openssh-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234412011" comment="pam_ssh_agent_auth is earlier than 0:0.10.4-5.30.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645012" comment="pam_ssh_agent_auth is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234462" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4462: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:4462" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4462"/>
        <reference ref_id="CVE-2023-4045" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4045"/>
        <reference ref_id="CVE-2023-4046" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4046"/>
        <reference ref_id="CVE-2023-4047" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4047"/>
        <reference ref_id="CVE-2023-4048" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4048"/>
        <reference ref_id="CVE-2023-4049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4049"/>
        <reference ref_id="CVE-2023-4050" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4050"/>
        <reference ref_id="CVE-2023-4055" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4055"/>
        <reference ref_id="CVE-2023-4056" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4056"/>
        <reference ref_id="CVE-2023-4057" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4057"/>
        <reference ref_id="ALSA-2023:4462" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4462.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.14.0 ESR.

Security Fix(es):

* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-03"/>
          <updated date="2023-08-03"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228360" id="2228360"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228361" id="2228361"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228362" id="2228362"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228363" id="2228363"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228364" id="2228364"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228365" id="2228365"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228367" id="2228367"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228370" id="2228370"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228371" id="2228371"></bugzilla>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4045" impact="Important" cwe="CWE-829" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4045</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4046" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4046</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4047" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4047</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4048" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4048</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4049" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4049</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4050" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4050</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4056" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4056</cve>
          <cve public="20230801" href="https://access.redhat.com/security/cve/CVE-2023-4057" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4057</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234462004" comment="firefox is earlier than 0:102.14.0-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234462005" comment="firefox-x11 is earlier than 0:102.14.0-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234569" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4569: dbus security update (Moderate)</title>
        <reference ref_id="RHSA-2023:4569" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4569"/>
        <reference ref_id="CVE-2023-34969" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34969"/>
        <reference ref_id="ALSA-2023:4569" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4569.html"/>
        <description>D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

Security Fix(es):

* dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-08"/>
          <updated date="2023-08-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2213166" id="2213166"></bugzilla>
          <cve public="20230606" href="https://access.redhat.com/security/cve/CVE-2023-34969" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-34969</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569001" comment="dbus is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335002" comment="dbus is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569005" comment="dbus-daemon is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335006" comment="dbus-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569014" comment="dbus-devel is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335008" comment="dbus-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569015" comment="dbus-libs is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335010" comment="dbus-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569011" comment="dbus-tools is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335012" comment="dbus-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569013" comment="dbus-x11 is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335014" comment="dbus-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234569003" comment="dbus-common is earlier than 1:1.12.20-7.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230335004" comment="dbus-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234634" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4634: rust security update (Important)</title>
        <reference ref_id="RHSA-2023:4634" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4634"/>
        <reference ref_id="CVE-2023-38497" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38497"/>
        <reference ref_id="ALSA-2023:4634" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4634.html"/>
        <description>Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. 

Security Fix(es):

* rust-cargo: cargo does not respect the umask when extracting dependencies (CVE-2023-38497)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-14"/>
          <updated date="2023-08-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228038" id="2228038"></bugzilla>
          <cve public="20230803" href="https://access.redhat.com/security/cve/CVE-2023-38497" impact="Important" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38497</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634001" comment="cargo is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634002" comment="cargo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634003" comment="clippy is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634004" comment="clippy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634005" comment="rust is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634006" comment="rust is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634007" comment="rust-analysis is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634008" comment="rust-analysis is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634009" comment="rust-analyzer is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634010" comment="rust-analyzer is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634013" comment="rust-doc is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634014" comment="rust-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634031" comment="rust-std-static is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634022" comment="rust-std-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634027" comment="rust-toolset is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634028" comment="rust-toolset is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634029" comment="rustfmt is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634030" comment="rustfmt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634011" comment="rust-debugger-common is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634012" comment="rust-debugger-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634015" comment="rust-gdb is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634016" comment="rust-gdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634017" comment="rust-lldb is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634018" comment="rust-lldb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634019" comment="rust-src is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634020" comment="rust-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634023" comment="rust-std-static-wasm32-unknown-unknown is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634024" comment="rust-std-static-wasm32-unknown-unknown is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634025" comment="rust-std-static-wasm32-wasi is earlier than 0:1.66.1-2.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234634026" comment="rust-std-static-wasm32-wasi is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234642" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:4642: .NET 7.0 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:4642" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4642"/>
        <reference ref_id="CVE-2023-35390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35390"/>
        <reference ref_id="CVE-2023-38180" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38180"/>
        <reference ref_id="ALSA-2023:4642" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4642.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.110 and .NET Runtime 7.0.10.

Security Fix(es):

* dotnet: RCE under dotnet commands (CVE-2023-35390)
* dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack (CVE-2023-38180)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-14"/>
          <updated date="2023-08-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228621" id="2228621"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228622" id="2228622"></bugzilla>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-35390" impact="Important" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-35390</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-38180" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38180</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642007" comment="dotnet-host is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.110-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.110-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.10-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642019" comment="dotnet-templates-7.0 is earlier than 0:7.0.110-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234642021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.110-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234644" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:4644: .NET 6.0 security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:4644" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4644"/>
        <reference ref_id="CVE-2023-35390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35390"/>
        <reference ref_id="CVE-2023-38180" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38180"/>
        <reference ref_id="ALSA-2023:4644" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4644.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.121 and .NET Runtime 6.0.21.

Security Fix(es):

* dotnet: RCE under dotnet commands (CVE-2023-35390)
* dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack (CVE-2023-38180)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-14"/>
          <updated date="2023-08-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228621" id="2228621"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228622" id="2228622"></bugzilla>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-35390" impact="Important" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-35390</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-38180" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38180</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.21-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.21-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.21-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.21-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.21-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.121-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.121-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.21-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234644017" comment="dotnet-templates-6.0 is earlier than 0:6.0.121-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234708" version="640" class="patch">
      <metadata>
        <title>ALSA-2023:4708: subscription-manager security update (Important)</title>
        <reference ref_id="RHSA-2023:4708" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4708"/>
        <reference ref_id="CVE-2023-3899" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3899"/>
        <reference ref_id="ALSA-2023:4708" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4708.html"/>
        <description>The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the AlmaLinux entitlement platform.

Security Fix(es):

* subscription-manager: inadequate authorization of com.AlmaLinux.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-22"/>
          <updated date="2023-08-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2225407" id="2225407"></bugzilla>
          <cve public="20230822" href="https://access.redhat.com/security/cve/CVE-2023-3899" impact="Important" cwe="CWE-285" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3899</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708011" comment="libdnf-plugin-subscription-manager is earlier than 0:1.29.33.1-2.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708002" comment="libdnf-plugin-subscription-manager is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708012" comment="python3-cloud-what is earlier than 0:1.29.33.1-2.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708004" comment="python3-cloud-what is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708013" comment="python3-subscription-manager-rhsm is earlier than 0:1.29.33.1-2.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708006" comment="python3-subscription-manager-rhsm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708014" comment="subscription-manager is earlier than 0:1.29.33.1-2.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708008" comment="subscription-manager is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708015" comment="subscription-manager-plugin-ostree is earlier than 0:1.29.33.1-2.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234708010" comment="subscription-manager-plugin-ostree is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234838" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4838: cups security update (Important)</title>
        <reference ref_id="RHSA-2023:4838" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4838"/>
        <reference ref_id="CVE-2023-32360" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32360"/>
        <reference ref_id="ALSA-2023:4838" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4838.html"/>
        <description>The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.

Security Fix(es):

* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-08-29"/>
          <updated date="2023-08-29"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2230495" id="2230495"></bugzilla>
          <cve public="20221206" href="https://access.redhat.com/security/cve/CVE-2023-32360" impact="Important" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-32360</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838001" comment="cups is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776016" comment="cups is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838003" comment="cups-client is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776017" comment="cups-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838016" comment="cups-devel is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776019" comment="cups-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838009" comment="cups-ipptool is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776020" comment="cups-ipptool is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838017" comment="cups-libs is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776022" comment="cups-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838013" comment="cups-lpd is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776023" comment="cups-lpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838015" comment="cups-printerapp is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776024" comment="cups-printerapp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234838007" comment="cups-filesystem is earlier than 1:2.3.3op2-16.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776025" comment="cups-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20234958" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:4958: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:4958" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:4958"/>
        <reference ref_id="CVE-2023-4051" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4051"/>
        <reference ref_id="CVE-2023-4053" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4053"/>
        <reference ref_id="CVE-2023-4573" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4573"/>
        <reference ref_id="CVE-2023-4574" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4574"/>
        <reference ref_id="CVE-2023-4575" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4575"/>
        <reference ref_id="CVE-2023-4577" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4577"/>
        <reference ref_id="CVE-2023-4578" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4578"/>
        <reference ref_id="CVE-2023-4580" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4580"/>
        <reference ref_id="CVE-2023-4581" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4581"/>
        <reference ref_id="CVE-2023-4583" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4583"/>
        <reference ref_id="CVE-2023-4584" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4584"/>
        <reference ref_id="CVE-2023-4585" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4585"/>
        <reference ref_id="ALSA-2023:4958" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-4958.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.15.0 ESR.

Security Fix(es):

* Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573)
* Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574)
* Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575)
* Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577)
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584)
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585)
* Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051)
* Mozilla: Full screen notification obscured by external program (CVE-2023-4053)
* Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578)
* Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580)
* Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581)
* Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-04"/>
          <updated date="2023-09-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2236071" id="2236071"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236072" id="2236072"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236073" id="2236073"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236075" id="2236075"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236076" id="2236076"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236077" id="2236077"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236078" id="2236078"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236079" id="2236079"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236080" id="2236080"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236082" id="2236082"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236084" id="2236084"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236086" id="2236086"></bugzilla>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4051" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-4051</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4053" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-4053</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4573" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4573</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4574" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4574</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4575" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4575</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4577" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4577</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4578" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-4578</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4580" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-4580</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4581" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-4581</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4584" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4584</cve>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-4585" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-4585</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234958004" comment="firefox is earlier than 0:102.15.0-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234958005" comment="firefox-x11 is earlier than 0:102.15.0-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235048" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5048: flac security update (Important)</title>
        <reference ref_id="RHSA-2023:5048" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5048"/>
        <reference ref_id="CVE-2020-22219" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-22219"/>
        <reference ref_id="ALSA-2023:5048" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5048.html"/>
        <description>FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files.

Security Fix(es):

* flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder (CVE-2020-22219)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-11"/>
          <updated date="2023-09-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235489" id="2235489"></bugzilla>
          <cve public="20230822" href="https://access.redhat.com/security/cve/CVE-2020-22219" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2020-22219</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235048001" comment="flac is earlier than 0:1.3.3-10.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078002" comment="flac is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235048006" comment="flac-devel is earlier than 0:1.3.3-10.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078004" comment="flac-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235048007" comment="flac-libs is earlier than 0:1.3.3-10.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228078006" comment="flac-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235068" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5068: linux-firmware security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5068" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5068"/>
        <reference ref_id="CVE-2023-20593" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-20593"/>
        <reference ref_id="ALSA-2023:5068" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5068.html"/>
        <description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.

Security Fix(es):

* hw: amd: Cross-Process Information Leak (CVE-2023-20593)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2217845" id="2217845"></bugzilla>
          <cve public="20230725" href="https://access.redhat.com/security/cve/CVE-2023-20593" impact="Moderate" cwe="CWE-1239" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-20593</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068035" comment="iwl100-firmware is earlier than 0:39.31.5.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068002" comment="iwl100-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068036" comment="iwl1000-firmware is earlier than 1:39.31.5.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068004" comment="iwl1000-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068037" comment="iwl105-firmware is earlier than 0:18.168.6.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068006" comment="iwl105-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068038" comment="iwl135-firmware is earlier than 0:18.168.6.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068008" comment="iwl135-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068039" comment="iwl2000-firmware is earlier than 0:18.168.6.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068010" comment="iwl2000-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068040" comment="iwl2030-firmware is earlier than 0:18.168.6.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068012" comment="iwl2030-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068041" comment="iwl3160-firmware is earlier than 1:25.30.13.0-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068014" comment="iwl3160-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068042" comment="iwl5000-firmware is earlier than 0:8.83.5.1_1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068016" comment="iwl5000-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068043" comment="iwl5150-firmware is earlier than 0:8.24.2.2-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068018" comment="iwl5150-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068044" comment="iwl6000g2a-firmware is earlier than 0:18.168.6.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068020" comment="iwl6000g2a-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068045" comment="iwl6000g2b-firmware is earlier than 0:18.168.6.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068022" comment="iwl6000g2b-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068046" comment="iwl6050-firmware is earlier than 0:41.28.5.1-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068024" comment="iwl6050-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068047" comment="iwl7260-firmware is earlier than 1:25.30.13.0-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068026" comment="iwl7260-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068048" comment="libertas-sd8787-firmware is earlier than 0:20230310-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068028" comment="libertas-sd8787-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068049" comment="linux-firmware is earlier than 0:20230310-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068030" comment="linux-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068050" comment="linux-firmware-whence is earlier than 0:20230310-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068032" comment="linux-firmware-whence is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068051" comment="netronome-firmware is earlier than 0:20230310-135.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068034" comment="netronome-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235069" version="640" class="patch">
      <metadata>
        <title>ALSA-2023:5069: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2023:5069" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5069"/>
        <reference ref_id="CVE-2023-1637" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1637"/>
        <reference ref_id="CVE-2023-20593" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-20593"/>
        <reference ref_id="CVE-2023-21102" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21102"/>
        <reference ref_id="CVE-2023-31248" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31248"/>
        <reference ref_id="CVE-2023-3390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3390"/>
        <reference ref_id="CVE-2023-35001" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35001"/>
        <reference ref_id="CVE-2023-3610" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3610"/>
        <reference ref_id="CVE-2023-3776" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3776"/>
        <reference ref_id="CVE-2023-4004" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4004"/>
        <reference ref_id="CVE-2023-4147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4147"/>
        <reference ref_id="ALSA-2023:5069" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5069.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.

The following packages have been upgraded to a later upstream version: kernel (5.14.0).

Security Fix(es):

* kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390)
* kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE (CVE-2023-3610)
* kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
* kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004)
* kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free (CVE-2023-4147)
* kernel: nf_tables: use-after-free in nft_chain_lookup_byid() (CVE-2023-31248)
* kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
* kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637)
* hw: amd: Cross-Process Information Leak (CVE-2023-20593)
* kernel: bypass of shadow stack protection due to a logic error (CVE-2023-21102)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [Intel 9.3 BUG] [SPR][EMR][FHF] ACPI: Fix system hang during S3 wakeup (BZ#2218026)
* [Dell 9.2 BUG] Monitor lost after replug WD19TBS to SUT port wiith VGA/DVI to type-C dongle (BZ#2219463)
* rtmutex: Incorrect waiter woken when requeueing in rt_mutex_adjust_prio_chain() (BZ#2222121)
* AlmaLinux AWS ARM Instability During Microshift e2e tests (BZ#2223310)
* AlmaLinux 9.x updates for SEV-SNP guest support (BZ#2224587)
* Lock state corruption from nested rtmutex blocking in blk_flush_plug() (BZ#2225623)
* bpf_jit_limit hit again - copy_seccomp() fix (BZ#2226945)
* libceph: harden msgr2.1 frame segment length checks (BZ#2227070)
* Temporary values used for the FIPS integrity test should be zeroized after use (BZ#2227768)
* Important iavf bug fixes July 2023 (BZ#2228156)
* [i40e/ice] error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228158)
* lvconvert --splitcache, --uncache operations getting hung (BZ#2228481)
* perf: EMR core and uncore PMU support (BZ#2230175)
* NVIDIA - Grace: Backport i2c: tegra: Set ACPI node as primary fwnode (BZ#2230483)
* NVIDIA - Grace: Backport i2c: tegra: Fix PEC support for SMBUS block read (BZ#2230488)
* [Hyper-V][AlmaLinux 9]incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230747)
* Kernel config option CONFIG_CRYPTO_STATS should be disabled until it is enhanced (BZ#2231850)
* [AlmaLinux 9][Hyper-V]Excessive hv_storvsc driver logging with srb_status  SRB_STATUS_INTERNAL_ERROR  (0x30) (BZ#2231990)
* AlmaLinux-9: WARNING: bad unlock balance detected! (BZ#2232213)
* NVIDIA - Grace: Backport drm/ast patch expected for kernel 6.4 (BZ#2232302)
* [Lenovo 9.1 bug]   AlmaLinux 9 will hang when "echo c &gt; /proc/sysrq-trigger". (BZ#2232700)
* [AlmaLinux-9] bz2022169 in /kernel/general/process/reg-suit fails on aarch64  (/proc/[pid]/wchan broken) (BZ#2233928)

Enhancement(s):

* [Intel 9.3 FEAT] cpufreq: intel_pstate: Enable HWP IO boost for all servers (BZ#2210270)
* [Dell 9.3 FEAT] - New MB with AMP Codec Change on Maya Bay (audio driver) (BZ#2218960)
* [Lenovo 9.3 FEAT] MDRAID - Update to the latest upstream (BZ#2221170)
* [Intel 9.3 FEAT] [EMR] Add EMR support to uncore-frequency driver (BZ#2230169)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2181891" id="2181891"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213260" id="2213260"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213455" id="2213455"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2217845" id="2217845"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2220892" id="2220892"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2220893" id="2220893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225097" id="2225097"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225198" id="2225198"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225239" id="2225239"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225275" id="2225275"></bugzilla>
          <cve public="20220405" href="https://access.redhat.com/security/cve/CVE-2023-1637" impact="Moderate" cwe="CWE-226-&gt;CWE-385-&gt;CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-1637</cve>
          <cve public="20230725" href="https://access.redhat.com/security/cve/CVE-2023-20593" impact="Moderate" cwe="CWE-1239" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-20593</cve>
          <cve public="20221205" href="https://access.redhat.com/security/cve/CVE-2023-21102" impact="Moderate" cwe="CWE-413" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-21102</cve>
          <cve public="20230705" href="https://access.redhat.com/security/cve/CVE-2023-31248" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-31248</cve>
          <cve public="20230608" href="https://access.redhat.com/security/cve/CVE-2023-3390" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3390</cve>
          <cve public="20230705" href="https://access.redhat.com/security/cve/CVE-2023-35001" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-35001</cve>
          <cve public="20230721" href="https://access.redhat.com/security/cve/CVE-2023-3610" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3610</cve>
          <cve public="20230706" href="https://access.redhat.com/security/cve/CVE-2023-3776" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3776</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-4004" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-4004</cve>
          <cve public="20230723" href="https://access.redhat.com/security/cve/CVE-2023-4147" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-4147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069001" comment="bpftool is earlier than 0:7.0.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069003" comment="kernel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069090" comment="kernel-64k is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069091" comment="kernel-64k-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069092" comment="kernel-64k-debug is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069093" comment="kernel-64k-debug-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069094" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069095" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069096" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069097" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069098" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069099" comment="kernel-64k-devel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069100" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069101" comment="kernel-64k-modules is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069102" comment="kernel-64k-modules-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069103" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069035" comment="kernel-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069037" comment="kernel-debug is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069039" comment="kernel-debug-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069041" comment="kernel-debug-devel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069043" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069045" comment="kernel-debug-modules is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069047" comment="kernel-debug-modules-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069049" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069104" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069053" comment="kernel-devel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069055" comment="kernel-devel-matched is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069057" comment="kernel-modules is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069105" comment="kernel-modules-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069061" comment="kernel-modules-extra is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069063" comment="kernel-tools is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069106" comment="kernel-tools-libs is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069107" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069108" comment="kernel-uki-virt is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069109" comment="kernel-zfcpdump is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069110" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069111" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069112" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069113" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069114" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069115" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069085" comment="perf is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069087" comment="python3-perf is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069116" comment="rtla is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235069033" comment="kernel-abi-stablelists is earlier than 0:5.14.0-284.30.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235071" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5071: libcap security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5071" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5071"/>
        <reference ref_id="CVE-2023-2602" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2602"/>
        <reference ref_id="CVE-2023-2603" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2603"/>
        <reference ref_id="ALSA-2023:5071" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5071.html"/>
        <description>Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.

Security Fix(es):

* libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603)
* libcap: Memory Leak on pthread_create() Error (CVE-2023-2602)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2209113" id="2209113"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209114" id="2209114"></bugzilla>
          <cve public="20230516" href="https://access.redhat.com/security/cve/CVE-2023-2602" impact="Low" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2023-2602</cve>
          <cve public="20230516" href="https://access.redhat.com/security/cve/CVE-2023-2603" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L">CVE-2023-2603</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235071001" comment="libcap is earlier than 0:2.48-9.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235071002" comment="libcap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235071003" comment="libcap-devel is earlier than 0:2.48-9.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235071004" comment="libcap-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235080" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5080: keylime security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5080" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5080"/>
        <reference ref_id="CVE-2023-38200" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38200"/>
        <reference ref_id="CVE-2023-38201" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38201"/>
        <reference ref_id="ALSA-2023:5080" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5080.html"/>
        <description>Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.

Security Fix(es):

* keylime: registrar is subject to a DoS against SSL connections (CVE-2023-38200)
* Keylime: challenge-response protocol bypass during agent registration (CVE-2023-38201)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222692" id="2222692"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222693" id="2222693"></bugzilla>
          <cve public="20230712" href="https://access.redhat.com/security/cve/CVE-2023-38200" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38200</cve>
          <cve public="20230823" href="https://access.redhat.com/security/cve/CVE-2023-38201" impact="Moderate" cwe="CWE-639" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-38201</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080014" comment="keylime is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444002" comment="keylime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080015" comment="keylime-base is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444004" comment="keylime-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080016" comment="keylime-registrar is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444006" comment="keylime-registrar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080017" comment="keylime-tenant is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444010" comment="keylime-tenant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080018" comment="keylime-verifier is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444012" comment="keylime-verifier is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080019" comment="python3-keylime is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444014" comment="python3-keylime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235080020" comment="keylime-selinux is earlier than 0:6.5.2-6.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444008" comment="keylime-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235081" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5081: librsvg2 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5081" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5081"/>
        <reference ref_id="CVE-2023-38633" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38633"/>
        <reference ref_id="ALSA-2023:5081" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5081.html"/>
        <description>The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library.

Security Fix(es):

* librsvg: Arbitrary file read when xinclude href has special characters (CVE-2023-38633)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2224945" id="2224945"></bugzilla>
          <cve public="20230722" href="https://access.redhat.com/security/cve/CVE-2023-38633" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-38633</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235081001" comment="librsvg2 is earlier than 0:2.50.7-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235081002" comment="librsvg2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235081003" comment="librsvg2-devel is earlier than 0:2.50.7-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235081004" comment="librsvg2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235081007" comment="librsvg2-tools is earlier than 0:2.50.7-1.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235081006" comment="librsvg2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235091" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:5091: kernel-rt security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:5091" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5091"/>
        <reference ref_id="CVE-2023-1637" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1637"/>
        <reference ref_id="CVE-2023-20593" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-20593"/>
        <reference ref_id="CVE-2023-21102" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21102"/>
        <reference ref_id="CVE-2023-31248" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31248"/>
        <reference ref_id="CVE-2023-3390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3390"/>
        <reference ref_id="CVE-2023-35001" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35001"/>
        <reference ref_id="CVE-2023-3610" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3610"/>
        <reference ref_id="CVE-2023-3776" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3776"/>
        <reference ref_id="CVE-2023-4004" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4004"/>
        <reference ref_id="CVE-2023-4147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4147"/>
        <reference ref_id="ALSA-2023:5091" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5091.html"/>
        <description>The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390)
* kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE (CVE-2023-3610)
* kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
* kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004)
* kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free (CVE-2023-4147)
* kernel: nf_tables: use-after-free in nft_chain_lookup_byid() (CVE-2023-31248)
* kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
* kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637)
* hw: amd: Cross-Process Information Leak (CVE-2023-20593)
* kernel: bypass of shadow stack protection due to a logic error (CVE-2023-21102)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* kernel-rt: update RT source tree to the latest AlmaLinux-9.2.z3 Batch (BZ#2228482)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2181891" id="2181891"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213260" id="2213260"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213455" id="2213455"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2217845" id="2217845"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2220892" id="2220892"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2220893" id="2220893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225097" id="2225097"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225198" id="2225198"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225239" id="2225239"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225275" id="2225275"></bugzilla>
          <cve public="20220405" href="https://access.redhat.com/security/cve/CVE-2023-1637" impact="Moderate" cwe="CWE-226-&gt;CWE-385-&gt;CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-1637</cve>
          <cve public="20230725" href="https://access.redhat.com/security/cve/CVE-2023-20593" impact="Moderate" cwe="CWE-1239" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-20593</cve>
          <cve public="20221205" href="https://access.redhat.com/security/cve/CVE-2023-21102" impact="Moderate" cwe="CWE-413" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-21102</cve>
          <cve public="20230705" href="https://access.redhat.com/security/cve/CVE-2023-31248" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-31248</cve>
          <cve public="20230608" href="https://access.redhat.com/security/cve/CVE-2023-3390" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3390</cve>
          <cve public="20230705" href="https://access.redhat.com/security/cve/CVE-2023-35001" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-35001</cve>
          <cve public="20230721" href="https://access.redhat.com/security/cve/CVE-2023-3610" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3610</cve>
          <cve public="20230706" href="https://access.redhat.com/security/cve/CVE-2023-3776" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3776</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-4004" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-4004</cve>
          <cve public="20230723" href="https://access.redhat.com/security/cve/CVE-2023-4147" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-4147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091028" comment="kernel-rt is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091029" comment="kernel-rt-core is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091030" comment="kernel-rt-debug is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091031" comment="kernel-rt-debug-core is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091032" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091033" comment="kernel-rt-debug-kvm is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267012" comment="kernel-rt-debug-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091034" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091035" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091036" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091037" comment="kernel-rt-devel is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091038" comment="kernel-rt-kvm is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267020" comment="kernel-rt-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091039" comment="kernel-rt-modules is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091040" comment="kernel-rt-modules-core is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235091041" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-284.30.1.rt14.315.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235094" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5094: qemu-kvm security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:5094" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5094"/>
        <reference ref_id="CVE-2023-3354" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3354"/>
        <reference ref_id="ALSA-2023:5094" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5094.html"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

* QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service (CVE-2023-3354)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* [qemu-kvm] rhel guest failed boot with multi disks on error Failed to start udev Wait for Complete Device Initialization (BZ#2211923)
* [almalinux9.2] hotplug/hotunplug mlx vdpa device to the occupied addr port, then qemu core dump occurs after shutdown guest (BZ#2227721)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2216478" id="2216478"></bugzilla>
          <cve public="20230628" href="https://access.redhat.com/security/cve/CVE-2023-3354" impact="Important" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-3354</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094038" comment="qemu-guest-agent is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094039" comment="qemu-img is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094040" comment="qemu-kvm is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094041" comment="qemu-kvm-audio-pa is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094042" comment="qemu-kvm-block-curl is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094043" comment="qemu-kvm-block-rbd is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094044" comment="qemu-kvm-common is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094045" comment="qemu-kvm-core is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094046" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094047" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094048" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094049" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094050" comment="qemu-kvm-device-usb-host is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094051" comment="qemu-kvm-device-usb-redirect is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094052" comment="qemu-kvm-docs is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094053" comment="qemu-kvm-tools is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094054" comment="qemu-kvm-ui-egl-headless is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094055" comment="qemu-kvm-ui-opengl is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235094056" comment="qemu-pr-helper is earlier than 17:7.2.0-14.el9_2.5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235143" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:5143: .NET 6.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5143" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5143"/>
        <reference ref_id="CVE-2023-36799" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36799"/>
        <reference ref_id="ALSA-2023:5143" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5143.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.122 and .NET Runtime 6.0.22.

Security Fix(es):

* dotnet:  Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-13"/>
          <updated date="2023-09-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2237317" id="2237317"></bugzilla>
          <cve public="20230913" href="https://access.redhat.com/security/cve/CVE-2023-36799" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36799</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.22-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.22-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.22-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.22-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.22-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.122-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.122-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.22-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235143017" comment="dotnet-templates-6.0 is earlier than 0:6.0.122-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235146" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5146: .NET 7.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5146" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5146"/>
        <reference ref_id="CVE-2023-36799" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36799"/>
        <reference ref_id="ALSA-2023:5146" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5146.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.111 and .NET Runtime 7.0.11.

Security Fix(es):

* dotnet:  Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-13"/>
          <updated date="2023-09-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2237317" id="2237317"></bugzilla>
          <cve public="20230913" href="https://access.redhat.com/security/cve/CVE-2023-36799" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36799</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146007" comment="dotnet-host is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.111-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.111-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.11-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146019" comment="dotnet-templates-7.0 is earlier than 0:7.0.111-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235146021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.111-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20251300" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:1300: gcc-toolset-14-gcc security update (Moderate)</title>
        <reference ref_id="CVE-2020-11023" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-11023"/>
        <reference ref_id="RHSA-2025:1300" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:1300"/>
        <reference ref_id="ALSA-2025:1300" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-1300.html"/>
        <description>The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14.  

Security Fix(es):  

  * jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-02-11"/>
          <updated date="2025-02-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1850004" id="1850004"></bugzilla>
          <cve public="20200429" href="https://access.redhat.com/security/cve/CVE-2020-11023" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2020-11023</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300001" comment="gcc-toolset-14-gcc is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300002" comment="gcc-toolset-14-gcc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300003" comment="gcc-toolset-14-gcc-c++ is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300004" comment="gcc-toolset-14-gcc-c++ is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300005" comment="gcc-toolset-14-gcc-gfortran is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300006" comment="gcc-toolset-14-gcc-gfortran is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300007" comment="gcc-toolset-14-gcc-plugin-annobin is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300008" comment="gcc-toolset-14-gcc-plugin-annobin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300009" comment="gcc-toolset-14-gcc-plugin-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300010" comment="gcc-toolset-14-gcc-plugin-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300011" comment="gcc-toolset-14-libasan-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300012" comment="gcc-toolset-14-libasan-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300013" comment="gcc-toolset-14-libatomic-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300014" comment="gcc-toolset-14-libatomic-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300015" comment="gcc-toolset-14-libgccjit is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300016" comment="gcc-toolset-14-libgccjit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300017" comment="gcc-toolset-14-libgccjit-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300018" comment="gcc-toolset-14-libgccjit-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300019" comment="gcc-toolset-14-libitm-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300020" comment="gcc-toolset-14-libitm-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300021" comment="gcc-toolset-14-liblsan-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300022" comment="gcc-toolset-14-liblsan-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300023" comment="gcc-toolset-14-libquadmath-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300024" comment="gcc-toolset-14-libquadmath-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300025" comment="gcc-toolset-14-libstdc++-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300026" comment="gcc-toolset-14-libstdc++-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300027" comment="gcc-toolset-14-libstdc++-docs is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300028" comment="gcc-toolset-14-libstdc++-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300029" comment="gcc-toolset-14-libtsan-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300030" comment="gcc-toolset-14-libtsan-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300031" comment="gcc-toolset-14-libubsan-devel is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300032" comment="gcc-toolset-14-libubsan-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300033" comment="gcc-toolset-14-offload-nvptx is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300034" comment="gcc-toolset-14-offload-nvptx is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300035" comment="libasan8 is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251309032" comment="libasan8 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300036" comment="libtsan2 is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251309036" comment="libtsan2 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251300037" comment="liblsan is earlier than 0:14.2.1-1.3.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20251309034" comment="liblsan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235200" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:5200: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:5200" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5200"/>
        <reference ref_id="CVE-2023-4863" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4863"/>
        <reference ref_id="ALSA-2023:5200" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5200.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 102.15.1 ESR.

Security Fix(es):

* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-18"/>
          <updated date="2023-09-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2238431" id="2238431"></bugzilla>
          <cve public="20230911" href="https://access.redhat.com/security/cve/CVE-2023-4863" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2023-4863</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235200004" comment="firefox is earlier than 0:102.15.1-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235200005" comment="firefox-x11 is earlier than 0:102.15.1-1.el9_2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235214" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5214: libwebp security update (Important)</title>
        <reference ref_id="RHSA-2023:5214" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5214"/>
        <reference ref_id="CVE-2023-4863" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4863"/>
        <reference ref_id="ALSA-2023:5214" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5214.html"/>
        <description>The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.

Security Fix(es):

* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-19"/>
          <updated date="2023-09-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2238431" id="2238431"></bugzilla>
          <cve public="20230911" href="https://access.redhat.com/security/cve/CVE-2023-4863" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2023-4863</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235214001" comment="libwebp is earlier than 0:1.2.0-7.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232078002" comment="libwebp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235214003" comment="libwebp-devel is earlier than 0:1.2.0-7.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232078004" comment="libwebp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235214007" comment="libwebp-tools is earlier than 0:1.2.0-7.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235214006" comment="libwebp-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235313" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5313: open-vm-tools security update (Important)</title>
        <reference ref_id="RHSA-2023:5313" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5313"/>
        <reference ref_id="CVE-2023-20900" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-20900"/>
        <reference ref_id="ALSA-2023:5313" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5313.html"/>
        <description>The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.

Security Fix(es):

* open-vm-tools: SAML token signature bypass (CVE-2023-20900)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-09-20"/>
          <updated date="2023-09-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2236542" id="2236542"></bugzilla>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-20900" impact="Important" cwe="CWE-347" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-20900</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235313010" comment="open-vm-tools is earlier than 0:12.1.5-1.el9_2.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358002" comment="open-vm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235313011" comment="open-vm-tools-desktop is earlier than 0:12.1.5-1.el9_2.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358004" comment="open-vm-tools-desktop is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235313012" comment="open-vm-tools-salt-minion is earlier than 0:12.1.5-1.el9_2.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948006" comment="open-vm-tools-salt-minion is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235313013" comment="open-vm-tools-sdmp is earlier than 0:12.1.5-1.el9_2.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358006" comment="open-vm-tools-sdmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235313014" comment="open-vm-tools-test is earlier than 0:12.1.5-1.el9_2.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358008" comment="open-vm-tools-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249439" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9439: fontforge security update (Moderate)</title>
        <reference ref_id="CVE-2024-25081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25081"/>
        <reference ref_id="CVE-2024-25082" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25082"/>
        <reference ref_id="RHSA-2024:9439" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9439"/>
        <reference ref_id="ALSA-2024:9439" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9439.html"/>
        <description>FontForge is a font editor for outline and bitmap fonts. It supports a range of font formats, including PostScript (ASCII and binary Type 1, some Type 3 and Type 0), TrueType, OpenType (Type2) and CID-keyed fonts.   

Security Fix(es):  

  * fontforge: command injection via crafted archives or compressed files (CVE-2024-25082)
  * fontforge: command injection via crafted filenames (CVE-2024-25081)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2266180" id="2266180"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2266181" id="2266181"></bugzilla>
          <cve public="20240226" href="https://access.redhat.com/security/cve/CVE-2024-25081" impact="Moderate" cwe="CWE-78" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L">CVE-2024-25081</cve>
          <cve public="20240226" href="https://access.redhat.com/security/cve/CVE-2024-25082" impact="Moderate" cwe="CWE-78" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L">CVE-2024-25082</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249439001" comment="fontforge is earlier than 0:20201107-6.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249439002" comment="fontforge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235434" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5434: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:5434" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5434"/>
        <reference ref_id="CVE-2023-3600" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3600"/>
        <reference ref_id="CVE-2023-5169" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5169"/>
        <reference ref_id="CVE-2023-5171" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5171"/>
        <reference ref_id="CVE-2023-5176" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5176"/>
        <reference ref_id="CVE-2023-5217" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5217"/>
        <reference ref_id="ALSA-2023:5434" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5434.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.3.1 ESR.

Security Fix(es):

* firefox: use-after-free in workers (CVE-2023-3600)
* Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169)
* Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171)
* Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176)
* libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-04"/>
          <updated date="2023-10-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222652" id="2222652"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240893" id="2240893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240894" id="2240894"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240896" id="2240896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241191" id="2241191"></bugzilla>
          <cve public="20230711" href="https://access.redhat.com/security/cve/CVE-2023-3600" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-3600</cve>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-5169" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-5169</cve>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-5171" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-5171</cve>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-5176" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5176</cve>
          <cve public="20230927" href="https://access.redhat.com/security/cve/CVE-2023-5217" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-5217</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235434004" comment="firefox is earlier than 0:115.3.1-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235434005" comment="firefox-x11 is earlier than 0:115.3.1-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235435" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5435: thunderbird security update (Important)</title>
        <reference ref_id="RHSA-2023:5435" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5435"/>
        <reference ref_id="CVE-2023-3600" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3600"/>
        <reference ref_id="CVE-2023-5169" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5169"/>
        <reference ref_id="CVE-2023-5171" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5171"/>
        <reference ref_id="CVE-2023-5176" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5176"/>
        <reference ref_id="CVE-2023-5217" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5217"/>
        <reference ref_id="ALSA-2023:5435" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5435.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.3.1.

Security Fix(es):

* firefox: use-after-free in workers (CVE-2023-3600)
* Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169)
* Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171)
* Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176)
* libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-04"/>
          <updated date="2023-10-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222652" id="2222652"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240893" id="2240893"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240894" id="2240894"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240896" id="2240896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241191" id="2241191"></bugzilla>
          <cve public="20230711" href="https://access.redhat.com/security/cve/CVE-2023-3600" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-3600</cve>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-5169" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-5169</cve>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-5171" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-5171</cve>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-5176" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5176</cve>
          <cve public="20230927" href="https://access.redhat.com/security/cve/CVE-2023-5217" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-5217</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20235435002" comment="thunderbird is earlier than 0:115.3.1-1.el9_2.alma.plus"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235453" version="639" class="patch">
      <metadata>
        <title>ALSA-2023:5453: glibc security update (Important)</title>
        <reference ref_id="RHSA-2023:5453" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5453"/>
        <reference ref_id="CVE-2023-4527" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4527"/>
        <reference ref_id="CVE-2023-4806" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4806"/>
        <reference ref_id="CVE-2023-4813" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4813"/>
        <reference ref_id="CVE-2023-4911" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4911"/>
        <reference ref_id="ALSA-2023:5453" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5453.html"/>
        <description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

* glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)
* glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527)
* glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806)
* glibc: potential use-after-free in gaih_inet() (CVE-2023-4813)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-05"/>
          <updated date="2023-10-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2234712" id="2234712"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237782" id="2237782"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237798" id="2237798"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238352" id="2238352"></bugzilla>
          <cve public="20230912" href="https://access.redhat.com/security/cve/CVE-2023-4527" impact="Moderate" cwe="CWE-121" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H">CVE-2023-4527</cve>
          <cve public="20230912" href="https://access.redhat.com/security/cve/CVE-2023-4806" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-4806</cve>
          <cve public="20220301" href="https://access.redhat.com/security/cve/CVE-2023-4813" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-4813</cve>
          <cve public="20231003" href="https://access.redhat.com/security/cve/CVE-2023-4911" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-4911</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453001" comment="glibc is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339430" comment="glibc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453431" comment="glibc-all-langpacks is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339432" comment="glibc-all-langpacks is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453432" comment="glibc-benchtests is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339434" comment="glibc-benchtests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453433" comment="glibc-common is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339436" comment="glibc-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453009" comment="glibc-devel is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339437" comment="glibc-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453013" comment="glibc-gconv-extra is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339438" comment="glibc-gconv-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453434" comment="glibc-headers is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339440" comment="glibc-headers is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453435" comment="glibc-langpack-aa is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339442" comment="glibc-langpack-aa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453436" comment="glibc-langpack-af is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339444" comment="glibc-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453437" comment="glibc-langpack-agr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339446" comment="glibc-langpack-agr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453438" comment="glibc-langpack-ak is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339448" comment="glibc-langpack-ak is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453439" comment="glibc-langpack-am is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339450" comment="glibc-langpack-am is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453440" comment="glibc-langpack-an is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339452" comment="glibc-langpack-an is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453441" comment="glibc-langpack-anp is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339454" comment="glibc-langpack-anp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453442" comment="glibc-langpack-ar is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339456" comment="glibc-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453443" comment="glibc-langpack-as is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339458" comment="glibc-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453444" comment="glibc-langpack-ast is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339460" comment="glibc-langpack-ast is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453445" comment="glibc-langpack-ayc is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339462" comment="glibc-langpack-ayc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453446" comment="glibc-langpack-az is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339464" comment="glibc-langpack-az is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453447" comment="glibc-langpack-be is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339466" comment="glibc-langpack-be is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453448" comment="glibc-langpack-bem is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339468" comment="glibc-langpack-bem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453449" comment="glibc-langpack-ber is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339470" comment="glibc-langpack-ber is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453450" comment="glibc-langpack-bg is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339472" comment="glibc-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453451" comment="glibc-langpack-bhb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339474" comment="glibc-langpack-bhb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453452" comment="glibc-langpack-bho is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339476" comment="glibc-langpack-bho is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453453" comment="glibc-langpack-bi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339478" comment="glibc-langpack-bi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453454" comment="glibc-langpack-bn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339480" comment="glibc-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453455" comment="glibc-langpack-bo is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339482" comment="glibc-langpack-bo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453456" comment="glibc-langpack-br is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339484" comment="glibc-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453457" comment="glibc-langpack-brx is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339486" comment="glibc-langpack-brx is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453458" comment="glibc-langpack-bs is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339488" comment="glibc-langpack-bs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453459" comment="glibc-langpack-byn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339490" comment="glibc-langpack-byn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453460" comment="glibc-langpack-ca is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339492" comment="glibc-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453461" comment="glibc-langpack-ce is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339494" comment="glibc-langpack-ce is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453462" comment="glibc-langpack-chr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339496" comment="glibc-langpack-chr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453463" comment="glibc-langpack-ckb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339498" comment="glibc-langpack-ckb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453464" comment="glibc-langpack-cmn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339500" comment="glibc-langpack-cmn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453465" comment="glibc-langpack-crh is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339502" comment="glibc-langpack-crh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453466" comment="glibc-langpack-cs is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339504" comment="glibc-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453467" comment="glibc-langpack-csb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339506" comment="glibc-langpack-csb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453468" comment="glibc-langpack-cv is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339508" comment="glibc-langpack-cv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453469" comment="glibc-langpack-cy is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339510" comment="glibc-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453470" comment="glibc-langpack-da is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339512" comment="glibc-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453471" comment="glibc-langpack-de is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339514" comment="glibc-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453472" comment="glibc-langpack-doi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339516" comment="glibc-langpack-doi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453473" comment="glibc-langpack-dsb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339518" comment="glibc-langpack-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453474" comment="glibc-langpack-dv is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339520" comment="glibc-langpack-dv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453475" comment="glibc-langpack-dz is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339522" comment="glibc-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453476" comment="glibc-langpack-el is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339524" comment="glibc-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453477" comment="glibc-langpack-en is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339526" comment="glibc-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453478" comment="glibc-langpack-eo is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339528" comment="glibc-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453479" comment="glibc-langpack-es is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339530" comment="glibc-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453480" comment="glibc-langpack-et is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339532" comment="glibc-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453481" comment="glibc-langpack-eu is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339534" comment="glibc-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453482" comment="glibc-langpack-fa is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339536" comment="glibc-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453483" comment="glibc-langpack-ff is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339538" comment="glibc-langpack-ff is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453484" comment="glibc-langpack-fi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339540" comment="glibc-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453485" comment="glibc-langpack-fil is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339542" comment="glibc-langpack-fil is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453486" comment="glibc-langpack-fo is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339544" comment="glibc-langpack-fo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453487" comment="glibc-langpack-fr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339546" comment="glibc-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453488" comment="glibc-langpack-fur is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339548" comment="glibc-langpack-fur is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453489" comment="glibc-langpack-fy is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339550" comment="glibc-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453490" comment="glibc-langpack-ga is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339552" comment="glibc-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453491" comment="glibc-langpack-gd is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339554" comment="glibc-langpack-gd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453492" comment="glibc-langpack-gez is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339556" comment="glibc-langpack-gez is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453493" comment="glibc-langpack-gl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339558" comment="glibc-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453494" comment="glibc-langpack-gu is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339560" comment="glibc-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453495" comment="glibc-langpack-gv is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339562" comment="glibc-langpack-gv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453496" comment="glibc-langpack-ha is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339564" comment="glibc-langpack-ha is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453497" comment="glibc-langpack-hak is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339566" comment="glibc-langpack-hak is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453498" comment="glibc-langpack-he is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339568" comment="glibc-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453499" comment="glibc-langpack-hi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339570" comment="glibc-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453500" comment="glibc-langpack-hif is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339572" comment="glibc-langpack-hif is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453501" comment="glibc-langpack-hne is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339574" comment="glibc-langpack-hne is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453502" comment="glibc-langpack-hr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339576" comment="glibc-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453503" comment="glibc-langpack-hsb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339578" comment="glibc-langpack-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453504" comment="glibc-langpack-ht is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339580" comment="glibc-langpack-ht is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453505" comment="glibc-langpack-hu is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339582" comment="glibc-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453506" comment="glibc-langpack-hy is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339584" comment="glibc-langpack-hy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453507" comment="glibc-langpack-ia is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339586" comment="glibc-langpack-ia is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453508" comment="glibc-langpack-id is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339588" comment="glibc-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453509" comment="glibc-langpack-ig is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339590" comment="glibc-langpack-ig is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453510" comment="glibc-langpack-ik is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339592" comment="glibc-langpack-ik is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453511" comment="glibc-langpack-is is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339594" comment="glibc-langpack-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453512" comment="glibc-langpack-it is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339596" comment="glibc-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453513" comment="glibc-langpack-iu is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339598" comment="glibc-langpack-iu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453514" comment="glibc-langpack-ja is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339600" comment="glibc-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453515" comment="glibc-langpack-ka is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339602" comment="glibc-langpack-ka is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453516" comment="glibc-langpack-kab is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339604" comment="glibc-langpack-kab is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453517" comment="glibc-langpack-kk is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339606" comment="glibc-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453518" comment="glibc-langpack-kl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339608" comment="glibc-langpack-kl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453519" comment="glibc-langpack-km is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339610" comment="glibc-langpack-km is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453520" comment="glibc-langpack-kn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339612" comment="glibc-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453521" comment="glibc-langpack-ko is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339614" comment="glibc-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453522" comment="glibc-langpack-kok is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339616" comment="glibc-langpack-kok is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453523" comment="glibc-langpack-ks is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339618" comment="glibc-langpack-ks is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453524" comment="glibc-langpack-ku is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339620" comment="glibc-langpack-ku is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453525" comment="glibc-langpack-kw is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339622" comment="glibc-langpack-kw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453526" comment="glibc-langpack-ky is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339624" comment="glibc-langpack-ky is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453527" comment="glibc-langpack-lb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339626" comment="glibc-langpack-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453528" comment="glibc-langpack-lg is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339628" comment="glibc-langpack-lg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453529" comment="glibc-langpack-li is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339630" comment="glibc-langpack-li is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453530" comment="glibc-langpack-lij is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339632" comment="glibc-langpack-lij is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453531" comment="glibc-langpack-ln is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339634" comment="glibc-langpack-ln is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453532" comment="glibc-langpack-lo is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339636" comment="glibc-langpack-lo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453533" comment="glibc-langpack-lt is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339638" comment="glibc-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453534" comment="glibc-langpack-lv is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339640" comment="glibc-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453535" comment="glibc-langpack-lzh is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339642" comment="glibc-langpack-lzh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453536" comment="glibc-langpack-mag is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339644" comment="glibc-langpack-mag is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453537" comment="glibc-langpack-mai is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339646" comment="glibc-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453538" comment="glibc-langpack-mfe is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339648" comment="glibc-langpack-mfe is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453539" comment="glibc-langpack-mg is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339650" comment="glibc-langpack-mg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453540" comment="glibc-langpack-mhr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339652" comment="glibc-langpack-mhr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453541" comment="glibc-langpack-mi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339654" comment="glibc-langpack-mi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453542" comment="glibc-langpack-miq is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339656" comment="glibc-langpack-miq is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453543" comment="glibc-langpack-mjw is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339658" comment="glibc-langpack-mjw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453544" comment="glibc-langpack-mk is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339660" comment="glibc-langpack-mk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453545" comment="glibc-langpack-ml is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339662" comment="glibc-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453546" comment="glibc-langpack-mn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339664" comment="glibc-langpack-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453547" comment="glibc-langpack-mni is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339666" comment="glibc-langpack-mni is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453548" comment="glibc-langpack-mnw is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339668" comment="glibc-langpack-mnw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453549" comment="glibc-langpack-mr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339670" comment="glibc-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453550" comment="glibc-langpack-ms is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339672" comment="glibc-langpack-ms is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453551" comment="glibc-langpack-mt is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339674" comment="glibc-langpack-mt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453552" comment="glibc-langpack-my is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339676" comment="glibc-langpack-my is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453553" comment="glibc-langpack-nan is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339678" comment="glibc-langpack-nan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453554" comment="glibc-langpack-nb is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339680" comment="glibc-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453555" comment="glibc-langpack-nds is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339682" comment="glibc-langpack-nds is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453556" comment="glibc-langpack-ne is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339684" comment="glibc-langpack-ne is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453557" comment="glibc-langpack-nhn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339686" comment="glibc-langpack-nhn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453558" comment="glibc-langpack-niu is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339688" comment="glibc-langpack-niu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453559" comment="glibc-langpack-nl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339690" comment="glibc-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453560" comment="glibc-langpack-nn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339692" comment="glibc-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453561" comment="glibc-langpack-nr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339694" comment="glibc-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453562" comment="glibc-langpack-nso is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339696" comment="glibc-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453563" comment="glibc-langpack-oc is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339698" comment="glibc-langpack-oc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453564" comment="glibc-langpack-om is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339700" comment="glibc-langpack-om is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453565" comment="glibc-langpack-or is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339702" comment="glibc-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453566" comment="glibc-langpack-os is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339704" comment="glibc-langpack-os is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453567" comment="glibc-langpack-pa is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339706" comment="glibc-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453568" comment="glibc-langpack-pap is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339708" comment="glibc-langpack-pap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453569" comment="glibc-langpack-pl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339710" comment="glibc-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453570" comment="glibc-langpack-ps is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339712" comment="glibc-langpack-ps is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453571" comment="glibc-langpack-pt is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339714" comment="glibc-langpack-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453572" comment="glibc-langpack-quz is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339716" comment="glibc-langpack-quz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453573" comment="glibc-langpack-raj is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339718" comment="glibc-langpack-raj is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453574" comment="glibc-langpack-ro is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339720" comment="glibc-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453575" comment="glibc-langpack-ru is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339722" comment="glibc-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453576" comment="glibc-langpack-rw is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339724" comment="glibc-langpack-rw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453577" comment="glibc-langpack-sa is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339726" comment="glibc-langpack-sa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453578" comment="glibc-langpack-sah is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339728" comment="glibc-langpack-sah is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453579" comment="glibc-langpack-sat is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339730" comment="glibc-langpack-sat is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453580" comment="glibc-langpack-sc is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339732" comment="glibc-langpack-sc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453581" comment="glibc-langpack-sd is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339734" comment="glibc-langpack-sd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453582" comment="glibc-langpack-se is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339736" comment="glibc-langpack-se is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453583" comment="glibc-langpack-sgs is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339738" comment="glibc-langpack-sgs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453584" comment="glibc-langpack-shn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339740" comment="glibc-langpack-shn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453585" comment="glibc-langpack-shs is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339742" comment="glibc-langpack-shs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453586" comment="glibc-langpack-si is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339744" comment="glibc-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453587" comment="glibc-langpack-sid is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339746" comment="glibc-langpack-sid is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453588" comment="glibc-langpack-sk is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339748" comment="glibc-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453589" comment="glibc-langpack-sl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339750" comment="glibc-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453590" comment="glibc-langpack-sm is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339752" comment="glibc-langpack-sm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453591" comment="glibc-langpack-so is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339754" comment="glibc-langpack-so is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453592" comment="glibc-langpack-sq is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339756" comment="glibc-langpack-sq is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453593" comment="glibc-langpack-sr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339758" comment="glibc-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453594" comment="glibc-langpack-ss is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339760" comment="glibc-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453595" comment="glibc-langpack-st is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339762" comment="glibc-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453596" comment="glibc-langpack-sv is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339764" comment="glibc-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453597" comment="glibc-langpack-sw is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339766" comment="glibc-langpack-sw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453598" comment="glibc-langpack-szl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339768" comment="glibc-langpack-szl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453599" comment="glibc-langpack-ta is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339770" comment="glibc-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453600" comment="glibc-langpack-tcy is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339772" comment="glibc-langpack-tcy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453601" comment="glibc-langpack-te is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339774" comment="glibc-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453602" comment="glibc-langpack-tg is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339776" comment="glibc-langpack-tg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453603" comment="glibc-langpack-th is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339778" comment="glibc-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453604" comment="glibc-langpack-the is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339780" comment="glibc-langpack-the is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453605" comment="glibc-langpack-ti is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339782" comment="glibc-langpack-ti is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453606" comment="glibc-langpack-tig is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339784" comment="glibc-langpack-tig is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453607" comment="glibc-langpack-tk is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339786" comment="glibc-langpack-tk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453608" comment="glibc-langpack-tl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339788" comment="glibc-langpack-tl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453609" comment="glibc-langpack-tn is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339790" comment="glibc-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453610" comment="glibc-langpack-to is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339792" comment="glibc-langpack-to is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453611" comment="glibc-langpack-tpi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339794" comment="glibc-langpack-tpi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453612" comment="glibc-langpack-tr is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339796" comment="glibc-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453613" comment="glibc-langpack-ts is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339798" comment="glibc-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453614" comment="glibc-langpack-tt is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339800" comment="glibc-langpack-tt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453615" comment="glibc-langpack-ug is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339802" comment="glibc-langpack-ug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453616" comment="glibc-langpack-uk is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339804" comment="glibc-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453617" comment="glibc-langpack-unm is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339806" comment="glibc-langpack-unm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453618" comment="glibc-langpack-ur is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339808" comment="glibc-langpack-ur is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453619" comment="glibc-langpack-uz is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339810" comment="glibc-langpack-uz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453620" comment="glibc-langpack-ve is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339812" comment="glibc-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453621" comment="glibc-langpack-vi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339814" comment="glibc-langpack-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453622" comment="glibc-langpack-wa is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339816" comment="glibc-langpack-wa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453623" comment="glibc-langpack-wae is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339818" comment="glibc-langpack-wae is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453624" comment="glibc-langpack-wal is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339820" comment="glibc-langpack-wal is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453625" comment="glibc-langpack-wo is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339822" comment="glibc-langpack-wo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453626" comment="glibc-langpack-xh is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339824" comment="glibc-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453627" comment="glibc-langpack-yi is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339826" comment="glibc-langpack-yi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453628" comment="glibc-langpack-yo is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339828" comment="glibc-langpack-yo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453629" comment="glibc-langpack-yue is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339830" comment="glibc-langpack-yue is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453630" comment="glibc-langpack-yuw is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339832" comment="glibc-langpack-yuw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453631" comment="glibc-langpack-zh is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339834" comment="glibc-langpack-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453632" comment="glibc-langpack-zu is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339836" comment="glibc-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453633" comment="glibc-locale-source is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339838" comment="glibc-locale-source is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453634" comment="glibc-minimal-langpack is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339840" comment="glibc-minimal-langpack is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453417" comment="glibc-nss-devel is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339841" comment="glibc-nss-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453419" comment="glibc-static is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339842" comment="glibc-static is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453635" comment="glibc-utils is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339844" comment="glibc-utils is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453423" comment="libnsl is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339845" comment="libnsl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453636" comment="nscd is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339847" comment="nscd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453427" comment="nss_db is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339848" comment="nss_db is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453429" comment="nss_hesiod is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339849" comment="nss_hesiod is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235453011" comment="glibc-doc is earlier than 0:2.34-60.el9_2.7"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339850" comment="glibc-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235456" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5456: python3.11 security update (Important)</title>
        <reference ref_id="RHSA-2023:5456" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5456"/>
        <reference ref_id="CVE-2023-40217" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40217"/>
        <reference ref_id="ALSA-2023:5456" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5456.html"/>
        <description>Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries.

Security Fix(es):

* python: TLS handshake bypass (CVE-2023-40217)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-05"/>
          <updated date="2023-10-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235789" id="2235789"></bugzilla>
          <cve public="20230825" href="https://access.redhat.com/security/cve/CVE-2023-40217" impact="Important" cwe="CWE-305" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N">CVE-2023-40217</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456001" comment="python3.11 is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077014" comment="python3.11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456003" comment="python3.11-debug is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077015" comment="python3.11-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456005" comment="python3.11-devel is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077016" comment="python3.11-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456007" comment="python3.11-idle is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077017" comment="python3.11-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456009" comment="python3.11-libs is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077018" comment="python3.11-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456011" comment="python3.11-test is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077019" comment="python3.11-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235456013" comment="python3.11-tkinter is earlier than 0:3.11.2-2.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077020" comment="python3.11-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235459" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5459: ghostscript security update (Important)</title>
        <reference ref_id="RHSA-2023:5459" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5459"/>
        <reference ref_id="CVE-2023-36664" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36664"/>
        <reference ref_id="ALSA-2023:5459" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5459.html"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: vulnerable to OS command injection due to mishandles permission validation for pipe devices (CVE-2023-36664)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-05"/>
          <updated date="2023-10-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2217798" id="2217798"></bugzilla>
          <cve public="20230627" href="https://access.redhat.com/security/cve/CVE-2023-36664" impact="Important" cwe="CWE-78" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-36664</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459001" comment="ghostscript is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999016" comment="ghostscript is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459017" comment="ghostscript-tools-dvipdf is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999018" comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459007" comment="ghostscript-tools-fonts is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999019" comment="ghostscript-tools-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459009" comment="ghostscript-tools-printing is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999020" comment="ghostscript-tools-printing is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459018" comment="ghostscript-x11 is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999022" comment="ghostscript-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459013" comment="libgs is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999023" comment="libgs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459015" comment="libgs-devel is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999024" comment="libgs-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235459003" comment="ghostscript-doc is earlier than 0:9.54.0-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999025" comment="ghostscript-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235462" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5462: python3.9 security update (Important)</title>
        <reference ref_id="RHSA-2023:5462" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5462"/>
        <reference ref_id="CVE-2023-40217" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40217"/>
        <reference ref_id="ALSA-2023:5462" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5462.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: TLS handshake bypass (CVE-2023-40217)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-05"/>
          <updated date="2023-10-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235789" id="2235789"></bugzilla>
          <cve public="20230825" href="https://access.redhat.com/security/cve/CVE-2023-40217" impact="Important" cwe="CWE-305" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N">CVE-2023-40217</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462003" comment="python3 is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462005" comment="python3-debug is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462007" comment="python3-devel is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462009" comment="python3-idle is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462011" comment="python3-libs is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462013" comment="python3-test is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462015" comment="python3-tkinter is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235462001" comment="python-unversioned-command is earlier than 0:3.9.16-1.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235532" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5532: nodejs security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:5532" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5532"/>
        <reference ref_id="CVE-2023-32002" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32002"/>
        <reference ref_id="CVE-2023-32006" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32006"/>
        <reference ref_id="CVE-2023-32559" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32559"/>
        <reference ref_id="ALSA-2023:5532" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5532.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* nodejs: Rebase to the latest Nodejs 16 release [almalinux-9] (BZ#2236434)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-09"/>
          <updated date="2023-10-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2230948" id="2230948"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2230955" id="2230955"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2230956" id="2230956"></bugzilla>
          <cve public="20230809" href="https://access.redhat.com/security/cve/CVE-2023-32002" impact="Important" cwe="CWE-213-&gt;CWE-1268" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-32002</cve>
          <cve public="20230809" href="https://access.redhat.com/security/cve/CVE-2023-32006" impact="Moderate" cwe="CWE-213" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N">CVE-2023-32006</cve>
          <cve public="20230809" href="https://access.redhat.com/security/cve/CVE-2023-32559" impact="Moderate" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-32559</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235532001" comment="nodejs is earlier than 1:16.20.2-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235532005" comment="nodejs-full-i18n is earlier than 1:16.20.2-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235532010" comment="nodejs-libs is earlier than 1:16.20.2-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235532009" comment="npm is earlier than 1:8.19.4-1.16.20.2.1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235532003" comment="nodejs-docs is earlier than 1:16.20.2-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235684" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5684: galera and mariadb security update (Important)</title>
        <reference ref_id="RHSA-2023:5684" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5684"/>
        <reference ref_id="CVE-2022-32081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32081"/>
        <reference ref_id="CVE-2022-32082" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32082"/>
        <reference ref_id="CVE-2022-32084" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32084"/>
        <reference ref_id="CVE-2022-32089" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32089"/>
        <reference ref_id="CVE-2022-32091" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32091"/>
        <reference ref_id="CVE-2022-38791" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38791"/>
        <reference ref_id="CVE-2022-47015" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-47015"/>
        <reference ref_id="CVE-2023-5157" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5157"/>
        <reference ref_id="ALSA-2023:5684" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5684.html"/>
        <description>MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

The following packages have been upgraded to a later upstream version: galera
(26.4.14), mariadb (10.5.22).

Security Fix(es):

* mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 (CVE-2023-5157)
* mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc (CVE-2022-32081)
* mariadb: assertion failure at table-&gt;get_ref_count() == 0 in dict0dict.cc (CVE-2022-32082)
* mariadb: segmentation fault via the component sub_select (CVE-2022-32084)
* mariadb: server crash in st_select_lex_unit::exclude_level (CVE-2022-32089)
* mariadb: server crash in JOIN_CACHE::free or in copy_fields (CVE-2022-32091)
* mariadb: compress_write() fails to release mutex on failure (CVE-2022-38791)
* mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() (CVE-2022-47015)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-12"/>
          <updated date="2023-10-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2106028" id="2106028"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106030" id="2106030"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106034" id="2106034"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106035" id="2106035"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2106042" id="2106042"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2130105" id="2130105"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2163609" id="2163609"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2240246" id="2240246"></bugzilla>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-32081" impact="Moderate" cwe="CWE-229" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-32081</cve>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-32082" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-32082</cve>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-32084" impact="Moderate" cwe="CWE-229" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-32084</cve>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-32089" impact="Moderate" cwe="CWE-229" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-32089</cve>
          <cve public="20210819" href="https://access.redhat.com/security/cve/CVE-2022-32091" impact="Moderate" cwe="CWE-229" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-32091</cve>
          <cve public="20220601" href="https://access.redhat.com/security/cve/CVE-2022-38791" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-38791</cve>
          <cve public="20220927" href="https://access.redhat.com/security/cve/CVE-2022-47015" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-47015</cve>
          <cve public="20230920" href="https://access.redhat.com/security/cve/CVE-2023-5157" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5157</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684031" comment="mariadb is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948002" comment="mariadb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684032" comment="mariadb-backup is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948004" comment="mariadb-backup is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684033" comment="mariadb-common is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948006" comment="mariadb-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684034" comment="mariadb-devel is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948008" comment="mariadb-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684035" comment="mariadb-embedded is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948010" comment="mariadb-embedded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684036" comment="mariadb-embedded-devel is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948012" comment="mariadb-embedded-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684037" comment="mariadb-errmsg is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948014" comment="mariadb-errmsg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684038" comment="mariadb-gssapi-server is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948016" comment="mariadb-gssapi-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684039" comment="mariadb-oqgraph-engine is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948018" comment="mariadb-oqgraph-engine is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684040" comment="mariadb-pam is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948020" comment="mariadb-pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684041" comment="mariadb-server is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948022" comment="mariadb-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684042" comment="mariadb-server-galera is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948024" comment="mariadb-server-galera is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684043" comment="mariadb-server-utils is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948026" comment="mariadb-server-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684044" comment="mariadb-test is earlier than 3:10.5.22-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225948028" comment="mariadb-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684045" comment="galera is earlier than 0:26.4.14-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235684030" comment="galera is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235689" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5689: bind security update (Important)</title>
        <reference ref_id="RHSA-2023:5689" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5689"/>
        <reference ref_id="CVE-2023-3341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3341"/>
        <reference ref_id="ALSA-2023:5689" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5689.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-12"/>
          <updated date="2023-10-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2239621" id="2239621"></bugzilla>
          <cve public="20230920" href="https://access.redhat.com/security/cve/CVE-2023-3341" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-3341</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689001" comment="bind is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689003" comment="bind-chroot is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689020" comment="bind-devel is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689009" comment="bind-dnssec-utils is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689021" comment="bind-libs is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689017" comment="bind-utils is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689007" comment="bind-dnssec-doc is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689011" comment="bind-doc is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068012" comment="bind-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689015" comment="bind-license is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235689019" comment="python3-bind is earlier than 32:9.16.23-11.el9_2.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235708" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5708: dotnet6.0 security update (Important)</title>
        <reference ref_id="RHSA-2023:5708" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5708"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5708" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5708.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are  .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23.

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-16"/>
          <updated date="2023-10-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.23-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.23-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.23-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.23-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.23-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.123-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.123-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.23-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235708017" comment="dotnet-templates-6.0 is earlier than 0:6.0.123-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235711" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5711: nginx security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5711" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5711"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5711" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5711.html"/>
        <description>nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. 

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-16"/>
          <updated date="2023-10-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711021" comment="nginx is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711002" comment="nginx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711022" comment="nginx-core is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711006" comment="nginx-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711023" comment="nginx-mod-devel is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711010" comment="nginx-mod-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711024" comment="nginx-mod-http-image-filter is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711012" comment="nginx-mod-http-image-filter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711025" comment="nginx-mod-http-perl is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711014" comment="nginx-mod-http-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711026" comment="nginx-mod-http-xslt-filter is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711016" comment="nginx-mod-http-xslt-filter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711027" comment="nginx-mod-mail is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711018" comment="nginx-mod-mail is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711028" comment="nginx-mod-stream is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711020" comment="nginx-mod-stream is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711029" comment="nginx-all-modules is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711004" comment="nginx-all-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711030" comment="nginx-filesystem is earlier than 1:1.20.1-14.el9_2.1.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235711008" comment="nginx-filesystem is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235733" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:5733: java-1.8.0-openjdk security update (Moderate)</title>
        <reference ref_id="RHSA-2023:5733" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5733"/>
        <reference ref_id="CVE-2022-40433" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-40433"/>
        <reference ref_id="CVE-2023-22067" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22067"/>
        <reference ref_id="CVE-2023-22081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22081"/>
        <reference ref_id="ALSA-2023:5733" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5733.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: segmentation fault in ciMethodBlocks (CVE-2022-40433)
* OpenJDK: IOR deserialization issue in CORBA (8303384) (CVE-2023-22067)
* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 8u382 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 8u392, increases it to 16 MB. (AlmaLinux-13593)
* The /usr/bin/jfr alternative is now owned by the java-1.8.0-openjdk package (AlmaLinux-13583)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-18"/>
          <updated date="2023-10-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2237709" id="2237709"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243627" id="2243627"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243637" id="2243637"></bugzilla>
          <cve public="20230823" href="https://access.redhat.com/security/cve/CVE-2022-40433" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-40433</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22067" impact="Moderate" cwe="CWE-502" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22067</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22081" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-22081</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235733025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.392.b08-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235738" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5738: go-toolset and golang security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:5738" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5738"/>
        <reference ref_id="CVE-2023-29409" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29409"/>
        <reference ref_id="CVE-2023-39325" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39325"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5738" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5738.html"/>
        <description>Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. 

The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: net/http, x/net/http2: rapid stream resets can cause excessive work [CVE-2023-44487] (CVE-2023-39325)
* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Midstream dist-git patches (BZ#2223637)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-16"/>
          <updated date="2023-10-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228743" id="2228743"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243296" id="2243296"></bugzilla>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-29409" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-29409</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-39325" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39325</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738016" comment="golang is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738017" comment="golang-bin is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738018" comment="golang-race is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225799010" comment="golang-race is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738019" comment="go-toolset is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738020" comment="golang-docs is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738021" comment="golang-misc is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738022" comment="golang-src is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235738023" comment="golang-tests is earlier than 0:1.19.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235744" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5744: java-11-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:5744" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5744"/>
        <reference ref_id="CVE-2023-22081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22081"/>
        <reference ref_id="ALSA-2023:5744" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5744.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2237175)
* A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB.
* The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210)
* The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (AlmaLinux-13532)
* The jcmd tool is now provided by the java-11-openjdk-headless package, rather than java-11-openjdk-devel, to make it more accessible (AlmaLinux-13536)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-18"/>
          <updated date="2023-10-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243627" id="2243627"></bugzilla>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22081" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-22081</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744001" comment="java-11-openjdk is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744003" comment="java-11-openjdk-demo is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744009" comment="java-11-openjdk-devel is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744017" comment="java-11-openjdk-headless is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744027" comment="java-11-openjdk-jmods is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744035" comment="java-11-openjdk-src is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235744045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.21.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235749" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:5749: .NET 7.0 security update (Important)</title>
        <reference ref_id="RHSA-2023:5749" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5749"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5749" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5749.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are  .NET 7.0 to SDK 7.0.112 and Runtime 7.0.12.

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-16"/>
          <updated date="2023-10-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749007" comment="dotnet-host is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.112-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.112-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.12-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749019" comment="dotnet-templates-7.0 is earlier than 0:7.0.112-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235749021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.112-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235753" version="640" class="patch">
      <metadata>
        <title>ALSA-2023:5753: java-17-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:5753" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5753"/>
        <reference ref_id="CVE-2023-22025" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22025"/>
        <reference ref_id="CVE-2023-22081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22081"/>
        <reference ref_id="ALSA-2023:5753" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5753.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) (CVE-2023-22025)
* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 17.0.8 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 17.0.9, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2237185)
* The /usr/bin/jfr alternative is now owned by the java-17-openjdk package (AlmaLinux-13648)
* The jcmd tool is now provided by the java-17-openjdk-headless package, rather than java-17-openjdk-devel, to make it more accessible (AlmaLinux-13651)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-18"/>
          <updated date="2023-10-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243627" id="2243627"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243805" id="2243805"></bugzilla>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-22025" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22025</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22081" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-22081</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753001" comment="java-17-openjdk is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753003" comment="java-17-openjdk-demo is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753009" comment="java-17-openjdk-devel is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753017" comment="java-17-openjdk-headless is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753027" comment="java-17-openjdk-jmods is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753035" comment="java-17-openjdk-src is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235753045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.9.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249454" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9454: podman security update (Important)</title>
        <reference ref_id="CVE-2024-9341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9341"/>
        <reference ref_id="CVE-2024-9407" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9407"/>
        <reference ref_id="CVE-2024-9675" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9675"/>
        <reference ref_id="CVE-2024-9676" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9676"/>
        <reference ref_id="CVE-2024-34155" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34155"/>
        <reference ref_id="CVE-2024-34156" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34156"/>
        <reference ref_id="CVE-2024-34158" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34158"/>
        <reference ref_id="RHSA-2024:9454" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9454"/>
        <reference ref_id="ALSA-2024:9454" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9454.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.  

Security Fix(es):  

  * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
  * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
  * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
  * Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341)
  * Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407)
  * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
  * Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2310527" id="2310527"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2310528" id="2310528"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2310529" id="2310529"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2315691" id="2315691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2315887" id="2315887"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2317458" id="2317458"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2317467" id="2317467"></bugzilla>
          <cve public="20241001" href="https://access.redhat.com/security/cve/CVE-2024-9341" impact="Moderate" cwe="CWE-59" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N">CVE-2024-9341</cve>
          <cve public="20241001" href="https://access.redhat.com/security/cve/CVE-2024-9407" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N">CVE-2024-9407</cve>
          <cve public="20241009" href="https://access.redhat.com/security/cve/CVE-2024-9675" impact="Important" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2024-9675</cve>
          <cve public="20241015" href="https://access.redhat.com/security/cve/CVE-2024-9676" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-9676</cve>
          <cve public="20240906" href="https://access.redhat.com/security/cve/CVE-2024-34155" impact="Moderate" cwe="CWE-674" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34155</cve>
          <cve public="20240906" href="https://access.redhat.com/security/cve/CVE-2024-34156" impact="Important" cwe="CWE-674" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34156</cve>
          <cve public="20240906" href="https://access.redhat.com/security/cve/CVE-2024-34158" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34158</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249454001" comment="podman is earlier than 4:5.2.2-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249454002" comment="podman-plugins is earlier than 4:5.2.2-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249454003" comment="podman-remote is earlier than 4:5.2.2-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249454004" comment="podman-tests is earlier than 4:5.2.2-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249454005" comment="podman-docker is earlier than 4:5.2.2-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235763" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:5763: curl security update (Important)</title>
        <reference ref_id="RHSA-2023:5763" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5763"/>
        <reference ref_id="CVE-2023-38545" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38545"/>
        <reference ref_id="CVE-2023-38546" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38546"/>
        <reference ref_id="ALSA-2023:5763" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5763.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: a heap-based buffer overflow in the SOCKS5 proxy handshake (CVE-2023-38545)
* curl: cookie injection with none file (CVE-2023-38546)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-17"/>
          <updated date="2023-10-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241933" id="2241933"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241938" id="2241938"></bugzilla>
          <cve public="20231011" href="https://access.redhat.com/security/cve/CVE-2023-38545" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38545</cve>
          <cve public="20231011" href="https://access.redhat.com/security/cve/CVE-2023-38546" impact="Low" cwe="CWE-73" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2023-38546</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235763001" comment="curl is earlier than 0:7.76.1-23.el9_2.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235763003" comment="curl-minimal is earlier than 0:7.76.1-23.el9_2.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235763010" comment="libcurl is earlier than 0:7.76.1-23.el9_2.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235763011" comment="libcurl-devel is earlier than 0:7.76.1-23.el9_2.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235763012" comment="libcurl-minimal is earlier than 0:7.76.1-23.el9_2.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235765" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5765: nodejs security update (Important)</title>
        <reference ref_id="RHSA-2023:5765" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5765"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5765" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5765.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* nodejs: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

A AlmaLinux Security Bulletin which addresses further details about this flaw is available in the References section.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-17"/>
          <updated date="2023-10-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235765001" comment="nodejs is earlier than 1:16.20.2-3.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235765005" comment="nodejs-full-i18n is earlier than 1:16.20.2-3.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235765010" comment="nodejs-libs is earlier than 1:16.20.2-3.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235765009" comment="npm is earlier than 1:8.19.4-1.16.20.2.3.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235765003" comment="nodejs-docs is earlier than 1:16.20.2-3.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235838" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:5838: nghttp2 security update (Important)</title>
        <reference ref_id="RHSA-2023:5838" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5838"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5838" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5838.html"/>
        <description>libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-18"/>
          <updated date="2023-10-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838001" comment="libnghttp2 is earlier than 0:1.43.0-5.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838002" comment="libnghttp2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838003" comment="libnghttp2-devel is earlier than 0:1.43.0-5.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838004" comment="libnghttp2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838007" comment="nghttp2 is earlier than 0:1.43.0-5.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838006" comment="nghttp2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241872" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1872: mod_http2 security update (Important)</title>
        <reference ref_id="RHSA-2024:1872" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1872"/>
        <reference ref_id="CVE-2024-27316" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27316"/>
        <reference ref_id="ALSA-2024:1872" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1872.html"/>
        <description>The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.

Security Fix(es):

* httpd: CONTINUATION frames DoS (CVE-2024-27316)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268277" id="2268277"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-27316" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27316</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20241872001" comment="mod_http2 is earlier than 0:1.15.19-5.el9_3.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20231670024" comment="mod_http2 is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249457" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9457: python3.12-urllib3 security update (Moderate)</title>
        <reference ref_id="CVE-2024-37891" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-37891"/>
        <reference ref_id="RHSA-2024:9457" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9457"/>
        <reference ref_id="ALSA-2024:9457" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9457.html"/>
        <description>urllib3 is a powerful, user-friendly HTTP client for Python. urllib3 brings many critical features that are missing from the Python standard libraries:   
• Thread safety.  
• Connection pooling.  
• Client-side SSL/TLS verification.  
• File uploads with multipart encoding.  
• Helpers for retrying requests and dealing with HTTP redirects.  
• Support for gzip, deflate, brotli, and zstd encoding.  
• Proxy support for HTTP and SOCKS.  
• 100% test coverage.  

Security Fix(es):  

  * urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2292788" id="2292788"></bugzilla>
          <cve public="20240617" href="https://access.redhat.com/security/cve/CVE-2024-37891" impact="Moderate" cwe="CWE-669" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2024-37891</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249457001" comment="python3.12-urllib3 is earlier than 0:1.26.18-2.el9_5.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20249457002" comment="python3.12-urllib3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235924" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5924: varnish security update (Important)</title>
        <reference ref_id="RHSA-2023:5924" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5924"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5924" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5924.html"/>
        <description>Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-19"/>
          <updated date="2023-10-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235924001" comment="varnish is earlier than 0:6.6.2-3.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643002" comment="varnish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235924003" comment="varnish-devel is earlier than 0:6.6.2-3.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643004" comment="varnish-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235924006" comment="varnish-docs is earlier than 0:6.6.2-3.el9_2.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643006" comment="varnish-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235926" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5926: php security update (Important)</title>
        <reference ref_id="RHSA-2023:5926" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5926"/>
        <reference ref_id="CVE-2023-0567" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0567"/>
        <reference ref_id="CVE-2023-0568" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0568"/>
        <reference ref_id="CVE-2023-0662" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0662"/>
        <reference ref_id="CVE-2023-3247" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3247"/>
        <reference ref_id="CVE-2023-3823" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3823"/>
        <reference ref_id="CVE-2023-3824" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3824"/>
        <reference ref_id="ALSA-2023:5926" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5926.html"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

Security Fix(es):

* php: XML loading external entity without being enabled (CVE-2023-3823)
* php: phar Buffer mismanagement (CVE-2023-3824)
* php: 1-byte array overrun in common path resolve code (CVE-2023-0568)
* php: DoS vulnerability when parsing multipart request body (CVE-2023-0662)
* php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)
* php: Password_verify() always return true with some hash (CVE-2023-0567)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-19"/>
          <updated date="2023-10-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2170761" id="2170761"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170770" id="2170770"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170771" id="2170771"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219290" id="2219290"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2229396" id="2229396"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2230101" id="2230101"></bugzilla>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-0567" impact="Low" cwe="CWE-328" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-0567</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-0568" impact="Moderate" cwe="CWE-770-&gt;CWE-131" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-0568</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-0662" impact="Moderate" cwe="CWE-400-&gt;CWE-779" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0662</cve>
          <cve public="20230703" href="https://access.redhat.com/security/cve/CVE-2023-3247" impact="Moderate" cwe="(CWE-252|CWE-334)" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-3247</cve>
          <cve public="20230803" href="https://access.redhat.com/security/cve/CVE-2023-3823" impact="Important" cwe="CWE-611" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L">CVE-2023-3823</cve>
          <cve public="20230803" href="https://access.redhat.com/security/cve/CVE-2023-3824" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3824</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926001" comment="php is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904002" comment="php is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926003" comment="php-bcmath is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904004" comment="php-bcmath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926005" comment="php-cli is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904006" comment="php-cli is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926007" comment="php-common is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904008" comment="php-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926009" comment="php-dba is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904010" comment="php-dba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926011" comment="php-dbg is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904012" comment="php-dbg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926013" comment="php-devel is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904014" comment="php-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926015" comment="php-embedded is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904016" comment="php-embedded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926017" comment="php-enchant is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904018" comment="php-enchant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926019" comment="php-ffi is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904020" comment="php-ffi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926021" comment="php-fpm is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904022" comment="php-fpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926023" comment="php-gd is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904024" comment="php-gd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926025" comment="php-gmp is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904026" comment="php-gmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926027" comment="php-intl is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904028" comment="php-intl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926029" comment="php-ldap is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904030" comment="php-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926031" comment="php-mbstring is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904032" comment="php-mbstring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926033" comment="php-mysqlnd is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904034" comment="php-mysqlnd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926035" comment="php-odbc is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904036" comment="php-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926037" comment="php-opcache is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904038" comment="php-opcache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926039" comment="php-pdo is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904040" comment="php-pdo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926041" comment="php-pgsql is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904042" comment="php-pgsql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926043" comment="php-process is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904044" comment="php-process is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926045" comment="php-snmp is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904046" comment="php-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926047" comment="php-soap is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904048" comment="php-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235926049" comment="php-xml is earlier than 0:8.0.30-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225904050" comment="php-xml is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20235929" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:5929: tomcat security update (Important)</title>
        <reference ref_id="RHSA-2023:5929" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:5929"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:5929" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-5929.html"/>
        <description>Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-19"/>
          <updated date="2023-10-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929001" comment="tomcat is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929002" comment="tomcat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929003" comment="tomcat-admin-webapps is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929004" comment="tomcat-admin-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929005" comment="tomcat-docs-webapp is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929006" comment="tomcat-docs-webapp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929007" comment="tomcat-el-3.0-api is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929008" comment="tomcat-el-3.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929009" comment="tomcat-jsp-2.3-api is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929010" comment="tomcat-jsp-2.3-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929011" comment="tomcat-lib is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929012" comment="tomcat-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929013" comment="tomcat-servlet-4.0-api is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929014" comment="tomcat-servlet-4.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929015" comment="tomcat-webapps is earlier than 1:9.0.62-11.el9_2.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929016" comment="tomcat-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236077" version="642" class="patch">
      <metadata>
        <title>ALSA-2023:6077: toolbox security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6077" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6077"/>
        <reference ref_id="CVE-2023-39325" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39325"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:6077" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6077.html"/>
        <description>The rhel9/toolbox container image can be used with Toolbox to obtain AlmaLinux based containerized command line environments to aid with development and software testing. Toolbox is built on top of Podman and other standard container technologies from OCI.

This updates the rhel9/toolbox image in the AlmaLinux container registry.

To pull this container image, run one of the following commands:

    podman pull registry.AlmaLinux.io/rhel9/toolbox (authenticated)
    podman pull registry.access.AlmaLinux.com/ubi9/toolbox (unauthenticated)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-24"/>
          <updated date="2023-10-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243296" id="2243296"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-39325" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39325</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236077001" comment="toolbox is earlier than 0:0.0.99.3-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098002" comment="toolbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236077003" comment="toolbox-tests is earlier than 0:0.0.99.3-10.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098004" comment="toolbox-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236120" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:6120: nginx:1.22 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6120" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6120"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:6120" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6120.html"/>
        <description>nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. 

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-25"/>
          <updated date="2023-10-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236120021" comment="Module nginx:1.22 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120022" comment="nginx is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711002" comment="nginx is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120023" comment="nginx-core is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711006" comment="nginx-core is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120024" comment="nginx-mod-devel is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711010" comment="nginx-mod-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120025" comment="nginx-mod-http-image-filter is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711012" comment="nginx-mod-http-image-filter is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120026" comment="nginx-mod-http-perl is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711014" comment="nginx-mod-http-perl is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120027" comment="nginx-mod-http-xslt-filter is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711016" comment="nginx-mod-http-xslt-filter is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120028" comment="nginx-mod-mail is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711018" comment="nginx-mod-mail is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120029" comment="nginx-mod-stream is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711020" comment="nginx-mod-stream is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120030" comment="nginx-all-modules is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711004" comment="nginx-all-modules is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20236120031" comment="nginx-filesystem is earlier than 1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20235711008" comment="nginx-filesystem is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236188" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6188: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:6188" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6188"/>
        <reference ref_id="CVE-2023-44488" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44488"/>
        <reference ref_id="CVE-2023-5721" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5721"/>
        <reference ref_id="CVE-2023-5724" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5724"/>
        <reference ref_id="CVE-2023-5725" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5725"/>
        <reference ref_id="CVE-2023-5728" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5728"/>
        <reference ref_id="CVE-2023-5730" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5730"/>
        <reference ref_id="CVE-2023-5732" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5732"/>
        <reference ref_id="ALSA-2023:6188" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6188.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.4.0 ESR.

Security Fix(es):

* Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721)
* Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730)
* libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488)
* Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724)
* Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725)
* Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728)
* Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-10-30"/>
          <updated date="2023-10-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241806" id="2241806"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245896" id="2245896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245898" id="2245898"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245899" id="2245899"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245900" id="2245900"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245903" id="2245903"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245906" id="2245906"></bugzilla>
          <cve public="20230930" href="https://access.redhat.com/security/cve/CVE-2023-44488" impact="Important" cwe="CWE-755" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44488</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5721" impact="Important" cwe="CWE-356" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-5721</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5724" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-5724</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5725" impact="Moderate" cwe="CWE-601" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-5725</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5728" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-5728</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5730" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-5730</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5732" impact="Moderate" cwe="CWE-450" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-5732</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236188004" comment="firefox is earlier than 0:115.4.0-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236188005" comment="firefox-x11 is earlier than 0:115.4.0-1.el9_2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236242" version="639" class="patch">
      <metadata>
        <title>ALSA-2023:6242: .NET 6.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6242" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6242"/>
        <reference ref_id="CVE-2023-36799" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36799"/>
        <reference ref_id="ALSA-2023:6242" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6242.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.124 and .NET Runtime 6.0.24.

Security Fix(es):

* dotnet: Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-01"/>
          <updated date="2023-11-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2237317" id="2237317"></bugzilla>
          <cve public="20230913" href="https://access.redhat.com/security/cve/CVE-2023-36799" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36799</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.24-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.24-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.24-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.24-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.24-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.124-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.124-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.24-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236242017" comment="dotnet-templates-6.0 is earlier than 0:6.0.124-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236246" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:6246: .NET 7.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6246" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6246"/>
        <reference ref_id="CVE-2023-36799" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36799"/>
        <reference ref_id="ALSA-2023:6246" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6246.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.113 and .NET Runtime 7.0.13.

Security Fix(es):

* dotnet: Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-02"/>
          <updated date="2023-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2237317" id="2237317"></bugzilla>
          <cve public="20230913" href="https://access.redhat.com/security/cve/CVE-2023-36799" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36799</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246007" comment="dotnet-host is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246009" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246011" comment="dotnet-runtime-7.0 is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246013" comment="dotnet-sdk-7.0 is earlier than 0:7.0.113-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246015" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.113-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246017" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.13-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246019" comment="dotnet-templates-7.0 is earlier than 0:7.0.113-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236246021" comment="netstandard-targeting-pack-2.1 is earlier than 0:7.0.113-1.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236265" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6265: ghostscript security update (Important)</title>
        <reference ref_id="RHSA-2023:6265" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6265"/>
        <reference ref_id="CVE-2023-43115" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43115"/>
        <reference ref_id="ALSA-2023:6265" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6265.html"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents (CVE-2023-43115)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-02"/>
          <updated date="2023-11-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241108" id="2241108"></bugzilla>
          <cve public="20230918" href="https://access.redhat.com/security/cve/CVE-2023-43115" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-43115</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265001" comment="ghostscript is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999016" comment="ghostscript is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265016" comment="ghostscript-tools-dvipdf is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999018" comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265007" comment="ghostscript-tools-fonts is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999019" comment="ghostscript-tools-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265009" comment="ghostscript-tools-printing is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999020" comment="ghostscript-tools-printing is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265017" comment="ghostscript-x11 is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999022" comment="ghostscript-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265013" comment="libgs is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999023" comment="libgs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265015" comment="libgs-devel is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999024" comment="libgs-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236265003" comment="ghostscript-doc is earlier than 0:9.54.0-11.el9_2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999025" comment="ghostscript-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236316" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6316: pcs security, bug fix, and enhancement update (Low)</title>
        <reference ref_id="RHSA-2023:6316" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6316"/>
        <reference ref_id="CVE-2022-38900" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38900"/>
        <reference ref_id="ALSA-2023:6316" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6316.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2170644" id="2170644"></bugzilla>
          <cve public="20221128" href="https://access.redhat.com/security/cve/CVE-2022-38900" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-38900</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236316001" comment="pcs is earlier than 0:0.11.6-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236316003" comment="pcs-snmp is earlier than 0:0.11.6-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236330" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6330: edk2 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6330" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6330"/>
        <reference ref_id="CVE-2019-14560" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2019-14560"/>
        <reference ref_id="CVE-2023-2650" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2650"/>
        <reference ref_id="ALSA-2023:6330" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6330.html"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() (CVE-2019-14560)
* openssl: Possible DoS translating ASN.1 object identifiers (CVE-2023-2650)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1858038" id="1858038"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2207947" id="2207947"></bugzilla>
          <cve public="20200701" href="https://access.redhat.com/security/cve/CVE-2019-14560" impact="Moderate" cwe="CWE-252" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L">CVE-2019-14560</cve>
          <cve public="20230530" href="https://access.redhat.com/security/cve/CVE-2023-2650" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-2650</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236330005" comment="edk2-tools is earlier than 0:20230524-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165006" comment="edk2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236330001" comment="edk2-aarch64 is earlier than 0:20230524-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165002" comment="edk2-aarch64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236330003" comment="edk2-ovmf is earlier than 0:20230524-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165004" comment="edk2-ovmf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236330007" comment="edk2-tools-doc is earlier than 0:20230524-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165008" comment="edk2-tools-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236340" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6340: xorg-x11-server security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6340" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6340"/>
        <reference ref_id="CVE-2023-1393" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1393"/>
        <reference ref_id="ALSA-2023:6340" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6340.html"/>
        <description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2180288" id="2180288"></bugzilla>
          <cve public="20230329" href="https://access.redhat.com/security/cve/CVE-2023-1393" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-1393</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340001" comment="xorg-x11-server-Xdmx is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221002" comment="xorg-x11-server-Xdmx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340003" comment="xorg-x11-server-Xephyr is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221004" comment="xorg-x11-server-Xephyr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340005" comment="xorg-x11-server-Xnest is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221006" comment="xorg-x11-server-Xnest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340007" comment="xorg-x11-server-Xorg is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221008" comment="xorg-x11-server-Xorg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340009" comment="xorg-x11-server-Xvfb is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221010" comment="xorg-x11-server-Xvfb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340011" comment="xorg-x11-server-common is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221012" comment="xorg-x11-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340016" comment="xorg-x11-server-devel is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221014" comment="xorg-x11-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236340015" comment="xorg-x11-server-source is earlier than 0:1.20.11-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221016" comment="xorg-x11-server-source is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202410983" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:10983: python3.9:3.9.21 security update (Moderate)</title>
        <reference ref_id="CVE-2024-9287" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9287"/>
        <reference ref_id="CVE-2024-11168" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11168"/>
        <reference ref_id="RHSA-2024:10983" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:10983"/>
        <reference ref_id="ALSA-2024:10983" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-10983.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.  

Security Fix(es):  

  * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
  * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-12-12"/>
          <updated date="2024-12-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2321440" id="2321440"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2325776" id="2325776"></bugzilla>
          <cve public="20241022" href="https://access.redhat.com/security/cve/CVE-2024-9287" impact="Moderate" cwe="CWE-428" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N">CVE-2024-9287</cve>
          <cve public="20241112" href="https://access.redhat.com/security/cve/CVE-2024-11168" impact="Moderate" cwe="CWE-1287" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-11168</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983001" comment="python3 is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983002" comment="python3-devel is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983003" comment="python3-libs is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983004" comment="python3-tkinter is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983005" comment="python3-debug is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983006" comment="python3-idle is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983007" comment="python3-test is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410983008" comment="python-unversioned-command is earlier than 0:3.9.21-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236343" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6343: LibRaw security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6343" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6343"/>
        <reference ref_id="CVE-2021-32142" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-32142"/>
        <reference ref_id="ALSA-2023:6343" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6343.html"/>
        <description>LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).

Security Fix(es):

* LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp (CVE-2021-32142)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2172004" id="2172004"></bugzilla>
          <cve public="20230217" href="https://access.redhat.com/security/cve/CVE-2021-32142" impact="Moderate" cwe="CWE-121-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2021-32142</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236343001" comment="LibRaw is earlier than 0:0.20.2-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236343002" comment="LibRaw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236343005" comment="LibRaw-devel is earlier than 0:0.20.2-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236343004" comment="LibRaw-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20251184" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:1184: thunderbird security update (Important)</title>
        <reference ref_id="CVE-2025-0510" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-0510"/>
        <reference ref_id="CVE-2025-1009" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1009"/>
        <reference ref_id="CVE-2025-1010" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1010"/>
        <reference ref_id="CVE-2025-1011" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1011"/>
        <reference ref_id="CVE-2025-1012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1012"/>
        <reference ref_id="CVE-2025-1013" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1013"/>
        <reference ref_id="CVE-2025-1014" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1014"/>
        <reference ref_id="CVE-2025-1015" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1015"/>
        <reference ref_id="CVE-2025-1016" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1016"/>
        <reference ref_id="CVE-2025-1017" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-1017"/>
        <reference ref_id="RHSA-2025:1184" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:1184"/>
        <reference ref_id="ALSA-2025:1184" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-1184.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.  

Security Fix(es):  

  * firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 (CVE-2025-1017)
  * firefox: thunderbird: Use-after-free in Custom Highlight (CVE-2025-1010)
  * firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 (CVE-2025-1016)
  * firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows (CVE-2025-1013)
  * firefox: thunderbird: A bug in WebAssembly code generation could result in a crash (CVE-2025-1011)
  * thunderbird: Unsanitized address book fields (CVE-2025-1015)
  * firefox: thunderbird: Use-after-free in XSLT (CVE-2025-1009)
  * thunderbird: Address of e-mail sender can be spoofed by malicious email (CVE-2025-0510)
  * firefox: thunderbird: Certificate length was not properly checked (CVE-2025-1014)
  * firefox: thunderbird: Use-after-free during concurrent delazification (CVE-2025-1012)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-02-10"/>
          <updated date="2025-02-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2343748" id="2343748"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343750" id="2343750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343752" id="2343752"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343754" id="2343754"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343756" id="2343756"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343759" id="2343759"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343760" id="2343760"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343762" id="2343762"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343764" id="2343764"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2343765" id="2343765"></bugzilla>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-0510" impact="Important" cwe="CWE-451" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N">CVE-2025-0510</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1009" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H">CVE-2025-1009</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1010" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H">CVE-2025-1010</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1011" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H">CVE-2025-1011</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1012" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H">CVE-2025-1012</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1013" impact="Low" cwe="CWE-362" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N">CVE-2025-1013</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1014" impact="Low" cwe="CWE-1284" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2025-1014</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1015" impact="Low" cwe="CWE-601" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2025-1015</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1016" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2025-1016</cve>
          <cve public="20250204" href="https://access.redhat.com/security/cve/CVE-2025-1017" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2025-1017</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20251184001" comment="thunderbird is earlier than 0:128.7.0-1.el9_5.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236346" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6346: toolbox security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6346" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6346"/>
        <reference ref_id="CVE-2022-3064" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-3064"/>
        <reference ref_id="CVE-2022-41723" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41723"/>
        <reference ref_id="CVE-2022-41725" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41725"/>
        <reference ref_id="CVE-2023-24534" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24534"/>
        <reference ref_id="CVE-2023-24536" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24536"/>
        <reference ref_id="CVE-2023-24538" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24538"/>
        <reference ref_id="CVE-2023-24539" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24539"/>
        <reference ref_id="CVE-2023-24540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24540"/>
        <reference ref_id="CVE-2023-29400" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29400"/>
        <reference ref_id="CVE-2023-29406" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29406"/>
        <reference ref_id="ALSA-2023:6346" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6346.html"/>
        <description>Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.

Security Fix(es):

* go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)
* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2163037" id="2163037"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178358" id="2178358"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178488" id="2178488"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184481" id="2184481"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184482" id="2184482"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184483" id="2184483"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196026" id="2196026"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196027" id="2196027"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196029" id="2196029"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222167" id="2222167"></bugzilla>
          <cve public="20220829" href="https://access.redhat.com/security/cve/CVE-2022-3064" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-3064</cve>
          <cve public="20230217" href="https://access.redhat.com/security/cve/CVE-2022-41723" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41723</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2022-41725" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41725</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24534" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24534</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24536" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24536</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24538" impact="Moderate" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-24538</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-24539" impact="Moderate" cwe="CWE-176" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-24539</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-24540" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-24540</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-29400" impact="Moderate" cwe="CWE-176" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-29400</cve>
          <cve public="20230711" href="https://access.redhat.com/security/cve/CVE-2023-29406" impact="Moderate" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2023-29406</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236346001" comment="toolbox is earlier than 0:0.0.99.4-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098002" comment="toolbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236346003" comment="toolbox-tests is earlier than 0:0.0.99.4-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098004" comment="toolbox-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236368" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6368: qemu-kvm security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6368" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6368"/>
        <reference ref_id="CVE-2023-2680" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2680"/>
        <reference ref_id="ALSA-2023:6368" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6368.html"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

The following packages have been upgraded to a later upstream version: qemu-kvm (8.0.0). (BZ#2180898)

Security Fix(es):

* QEMU: hcd-ehci: DMA reentrancy issue (incomplete fix for CVE-2021-3750) (CVE-2023-2680)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2203387" id="2203387"></bugzilla>
          <cve public="20230512" href="https://access.redhat.com/security/cve/CVE-2023-2680" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2023-2680</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368040" comment="qemu-guest-agent is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368041" comment="qemu-img is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368042" comment="qemu-kvm is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368043" comment="qemu-kvm-audio-pa is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368044" comment="qemu-kvm-block-blkio is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368010" comment="qemu-kvm-block-blkio is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368045" comment="qemu-kvm-block-curl is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368046" comment="qemu-kvm-block-rbd is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368047" comment="qemu-kvm-common is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368048" comment="qemu-kvm-core is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368049" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368050" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368051" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368052" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368053" comment="qemu-kvm-device-usb-host is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368054" comment="qemu-kvm-device-usb-redirect is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368055" comment="qemu-kvm-docs is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368056" comment="qemu-kvm-tools is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368057" comment="qemu-kvm-ui-egl-headless is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368058" comment="qemu-kvm-ui-opengl is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368059" comment="qemu-pr-helper is earlier than 17:8.0.0-16.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236369" version="639" class="patch">
      <metadata>
        <title>ALSA-2023:6369: qt5 security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6369" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6369"/>
        <reference ref_id="CVE-2023-32573" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32573"/>
        <reference ref_id="CVE-2023-33285" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-33285"/>
        <reference ref_id="CVE-2023-34410" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34410"/>
        <reference ref_id="CVE-2023-37369" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37369"/>
        <reference ref_id="CVE-2023-38197" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38197"/>
        <reference ref_id="ALSA-2023:6369" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6369.html"/>
        <description>Qt is a software toolkit for developing applications.

Security Fix(es):

* qt: buffer over-read via a crafted reply from a DNS server (CVE-2023-33285)
* qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation (CVE-2023-34410)
* qtbase: buffer overflow in QXmlStreamReader (CVE-2023-37369)
* qtbase: infinite loops in QXmlStreamReader (CVE-2023-38197)
* qt: Uninitialized variable usage in m_unitsPerEm (CVE-2023-32573)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2208135" id="2208135"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209488" id="2209488"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2212747" id="2212747"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222767" id="2222767"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2232173" id="2232173"></bugzilla>
          <cve public="20230510" href="https://access.redhat.com/security/cve/CVE-2023-32573" impact="Low" cwe="CWE-369" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-32573</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-33285" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-33285</cve>
          <cve public="20230604" href="https://access.redhat.com/security/cve/CVE-2023-34410" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-34410</cve>
          <cve public="20230713" href="https://access.redhat.com/security/cve/CVE-2023-37369" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-37369</cve>
          <cve public="20230712" href="https://access.redhat.com/security/cve/CVE-2023-38197" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-38197</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369009" comment="qt5-qtbase is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369010" comment="qt5-qtbase is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369013" comment="qt5-qtbase-devel is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369014" comment="qt5-qtbase-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369015" comment="qt5-qtbase-examples is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369016" comment="qt5-qtbase-examples is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369017" comment="qt5-qtbase-gui is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369018" comment="qt5-qtbase-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369019" comment="qt5-qtbase-mysql is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369020" comment="qt5-qtbase-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369021" comment="qt5-qtbase-odbc is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369022" comment="qt5-qtbase-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369023" comment="qt5-qtbase-postgresql is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369024" comment="qt5-qtbase-postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369025" comment="qt5-qtbase-private-devel is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369026" comment="qt5-qtbase-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369027" comment="qt5-qtbase-static is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369028" comment="qt5-qtbase-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369001" comment="qt5 is earlier than 0:5.15.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228022002" comment="qt5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369003" comment="qt5-devel is earlier than 0:5.15.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228022004" comment="qt5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369005" comment="qt5-rpm-macros is earlier than 0:5.15.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228022006" comment="qt5-rpm-macros is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369007" comment="qt5-srpm-macros is earlier than 0:5.15.9-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228022008" comment="qt5-srpm-macros is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369011" comment="qt5-qtbase-common is earlier than 0:5.15.9-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369012" comment="qt5-qtbase-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236372" version="639" class="patch">
      <metadata>
        <title>ALSA-2023:6372: gdb security update (Low)</title>
        <reference ref_id="RHSA-2023:6372" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6372"/>
        <reference ref_id="CVE-2021-3826" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3826"/>
        <reference ref_id="ALSA-2023:6372" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6372.html"/>
        <description>The GNU Debugger (GDB) allows users to debug programs written in various programming languages including C, C++, and Fortran. 

Security Fix(es):

* libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c (CVE-2021-3826)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2122627" id="2122627"></bugzilla>
          <cve public="20210922" href="https://access.redhat.com/security/cve/CVE-2021-3826" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-3826</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372001" comment="gdb is earlier than 0:10.2-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372002" comment="gdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372005" comment="gdb-gdbserver is earlier than 0:10.2-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372006" comment="gdb-gdbserver is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372007" comment="gdb-headless is earlier than 0:10.2-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372008" comment="gdb-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372009" comment="gdb-minimal is earlier than 0:10.2-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372010" comment="gdb-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372003" comment="gdb-doc is earlier than 0:10.2-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236372004" comment="gdb-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236380" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6380: runc security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6380" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6380"/>
        <reference ref_id="CVE-2021-43784" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-43784"/>
        <reference ref_id="CVE-2022-41724" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41724"/>
        <reference ref_id="CVE-2023-25809" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25809"/>
        <reference ref_id="CVE-2023-27561" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27561"/>
        <reference ref_id="CVE-2023-28642" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28642"/>
        <reference ref_id="ALSA-2023:6380" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6380.html"/>
        <description>The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
* runc: Rootless runc makes `/sys/fs/cgroup` writable (CVE-2023-25809)
* runc: volume mount race condition (regression of CVE-2019-19921) (CVE-2023-27561)
* runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration (CVE-2023-28642)
* runc: integer overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration (CVE-2021-43784)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2029439" id="2029439"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2175721" id="2175721"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178492" id="2178492"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2182883" id="2182883"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2182884" id="2182884"></bugzilla>
          <cve public="20211206" href="https://access.redhat.com/security/cve/CVE-2021-43784" impact="Low" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L">CVE-2021-43784</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2022-41724" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41724</cve>
          <cve public="20230329" href="https://access.redhat.com/security/cve/CVE-2023-25809" impact="Moderate" cwe="CWE-276" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L">CVE-2023-25809</cve>
          <cve public="20230220" href="https://access.redhat.com/security/cve/CVE-2023-27561" impact="Moderate" cwe="CWE-41" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-27561</cve>
          <cve public="20230329" href="https://access.redhat.com/security/cve/CVE-2023-28642" impact="Moderate" cwe="CWE-305" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-28642</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20236380001" comment="runc is earlier than 4:1.1.9-1.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244762002" comment="runc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236385" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6385: liblouis security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6385" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6385"/>
        <reference ref_id="CVE-2023-26767" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-26767"/>
        <reference ref_id="CVE-2023-26768" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-26768"/>
        <reference ref_id="CVE-2023-26769" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-26769"/>
        <reference ref_id="ALSA-2023:6385" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6385.html"/>
        <description>Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg).

Security Fix(es):

* liblouis: buffer overflow in lou_logFile function at logginc.c (CVE-2023-26767)
* liblouis: buffer overflow in lou_setDataPath (CVE-2023-26768)
* liblouis: buffer overflow in Lou_Trace (CVE-2023-26769)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2181135" id="2181135"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2181139" id="2181139"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2181143" id="2181143"></bugzilla>
          <cve public="20230204" href="https://access.redhat.com/security/cve/CVE-2023-26767" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-26767</cve>
          <cve public="20230304" href="https://access.redhat.com/security/cve/CVE-2023-26768" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-26768</cve>
          <cve public="20230204" href="https://access.redhat.com/security/cve/CVE-2023-26769" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-26769</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236385001" comment="liblouis is earlier than 0:3.16.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236385002" comment="liblouis is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236385003" comment="python3-louis is earlier than 0:3.16.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236385004" comment="python3-louis is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236403" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6403: httpd and mod_http2 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6403" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6403"/>
        <reference ref_id="CVE-2023-27522" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27522"/>
        <reference ref_id="ALSA-2023:6403" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6403.html"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

The following packages have been upgraded to a later upstream version: httpd (2.4.57). (BZ#2184403)

Security Fix(es):

* httpd: mod_proxy_uwsgi HTTP response splitting (CVE-2023-27522)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2176211" id="2176211"></bugzilla>
          <cve public="20230307" href="https://access.redhat.com/security/cve/CVE-2023-27522" impact="Moderate" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-27522</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403001" comment="httpd is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726022" comment="httpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403003" comment="httpd-core is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726023" comment="httpd-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403005" comment="httpd-devel is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726024" comment="httpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403011" comment="httpd-tools is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726025" comment="httpd-tools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403013" comment="mod_ldap is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726026" comment="mod_ldap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403015" comment="mod_lua is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726027" comment="mod_lua is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403017" comment="mod_proxy_html is earlier than 1:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726028" comment="mod_proxy_html is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403019" comment="mod_session is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726029" comment="mod_session is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403021" comment="mod_ssl is earlier than 1:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726030" comment="mod_ssl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403007" comment="httpd-filesystem is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726031" comment="httpd-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236403009" comment="httpd-manual is earlier than 0:2.4.57-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726032" comment="httpd-manual is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236409" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6409: libvirt security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6409" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6409"/>
        <reference ref_id="CVE-2023-3750" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3750"/>
        <reference ref_id="ALSA-2023:6409" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6409.html"/>
        <description>The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

The following packages have been upgraded to a later upstream version: libvirt (9.5.0). (BZ#2175785)

Security Fix(es):

* libvirt: improper locking in virStoragePoolObjListSearch may lead to denial of service (CVE-2023-3750)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222210" id="2222210"></bugzilla>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-3750" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-3750</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409062" comment="libvirt is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757063" comment="libvirt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409063" comment="libvirt-client is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757065" comment="libvirt-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409064" comment="libvirt-client-qemu is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757067" comment="libvirt-client-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409065" comment="libvirt-daemon is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757069" comment="libvirt-daemon is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409066" comment="libvirt-daemon-common is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757071" comment="libvirt-daemon-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409067" comment="libvirt-daemon-config-network is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757073" comment="libvirt-daemon-config-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409068" comment="libvirt-daemon-config-nwfilter is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757075" comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409069" comment="libvirt-daemon-driver-interface is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757077" comment="libvirt-daemon-driver-interface is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409070" comment="libvirt-daemon-driver-network is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757079" comment="libvirt-daemon-driver-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409071" comment="libvirt-daemon-driver-nodedev is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757081" comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409072" comment="libvirt-daemon-driver-nwfilter is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757083" comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409073" comment="libvirt-daemon-driver-qemu is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757085" comment="libvirt-daemon-driver-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409074" comment="libvirt-daemon-driver-secret is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757087" comment="libvirt-daemon-driver-secret is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409075" comment="libvirt-daemon-driver-storage is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757089" comment="libvirt-daemon-driver-storage is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409076" comment="libvirt-daemon-driver-storage-core is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757091" comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409077" comment="libvirt-daemon-driver-storage-disk is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757093" comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409078" comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757095" comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409079" comment="libvirt-daemon-driver-storage-logical is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757097" comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409080" comment="libvirt-daemon-driver-storage-mpath is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757099" comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409081" comment="libvirt-daemon-driver-storage-rbd is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757101" comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409082" comment="libvirt-daemon-driver-storage-scsi is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757103" comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409083" comment="libvirt-daemon-kvm is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757105" comment="libvirt-daemon-kvm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409084" comment="libvirt-daemon-lock is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757107" comment="libvirt-daemon-lock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409085" comment="libvirt-daemon-log is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757109" comment="libvirt-daemon-log is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409086" comment="libvirt-daemon-plugin-lockd is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757111" comment="libvirt-daemon-plugin-lockd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409087" comment="libvirt-daemon-plugin-sanlock is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757113" comment="libvirt-daemon-plugin-sanlock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409088" comment="libvirt-daemon-proxy is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757115" comment="libvirt-daemon-proxy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409089" comment="libvirt-devel is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757117" comment="libvirt-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409090" comment="libvirt-docs is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757119" comment="libvirt-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409091" comment="libvirt-libs is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757121" comment="libvirt-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236409092" comment="libvirt-nss is earlier than 0:9.5.0-7.el9_3.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757123" comment="libvirt-nss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236429" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6429: libpq security update (Low)</title>
        <reference ref_id="RHSA-2023:6429" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6429"/>
        <reference ref_id="CVE-2022-41862" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41862"/>
        <reference ref_id="ALSA-2023:6429" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6429.html"/>
        <description>The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. 

Security Fix(es):

* postgresql: Client memory disclosure when connecting with Kerberos to modified server (CVE-2022-41862)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2165722" id="2165722"></bugzilla>
          <cve public="20230209" href="https://access.redhat.com/security/cve/CVE-2022-41862" impact="Low" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2022-41862</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236429001" comment="libpq is earlier than 0:13.11-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236429002" comment="libpq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236429003" comment="libpq-devel is earlier than 0:13.11-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236429004" comment="libpq-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236469" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6469: wireshark security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6469" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6469"/>
        <reference ref_id="CVE-2023-0666" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0666"/>
        <reference ref_id="CVE-2023-0668" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0668"/>
        <reference ref_id="CVE-2023-2855" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2855"/>
        <reference ref_id="CVE-2023-2856" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2856"/>
        <reference ref_id="CVE-2023-2858" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2858"/>
        <reference ref_id="CVE-2023-2952" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2952"/>
        <reference ref_id="ALSA-2023:6469" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6469.html"/>
        <description>The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.

Security Fix(es):

* wireshark: RTPS dissector crash (CVE-2023-0666)
* wireshark: IEEE C37.118 Synchrophasor dissector crash (CVE-2023-0668)
* wireshark: Candump log file parser crash (CVE-2023-2855)
* wireshark: VMS TCPIPtrace file parser crash (CVE-2023-2856)
* wireshark: NetScaler file parser crash (CVE-2023-2858)
* wireshark: XRA dissector infinite loop (CVE-2023-2952)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2210822" id="2210822"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210824" id="2210824"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210829" id="2210829"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210832" id="2210832"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210835" id="2210835"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2211406" id="2211406"></bugzilla>
          <cve public="20230518" href="https://access.redhat.com/security/cve/CVE-2023-0666" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-0666</cve>
          <cve public="20230518" href="https://access.redhat.com/security/cve/CVE-2023-0668" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-0668</cve>
          <cve public="20230511" href="https://access.redhat.com/security/cve/CVE-2023-2855" impact="Moderate" cwe="CWE-121" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-2855</cve>
          <cve public="20230518" href="https://access.redhat.com/security/cve/CVE-2023-2856" impact="Moderate" cwe="CWE-121" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-2856</cve>
          <cve public="20230517" href="https://access.redhat.com/security/cve/CVE-2023-2858" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-2858</cve>
          <cve public="20230523" href="https://access.redhat.com/security/cve/CVE-2023-2952" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-2952</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236469001" comment="wireshark is earlier than 1:3.4.10-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373002" comment="wireshark is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236469006" comment="wireshark-cli is earlier than 1:3.4.10-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373004" comment="wireshark-cli is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236469007" comment="wireshark-devel is earlier than 1:3.4.10-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232373006" comment="wireshark-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236474" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6474: podman security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6474" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6474"/>
        <reference ref_id="CVE-2022-41723" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41723"/>
        <reference ref_id="CVE-2022-41724" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41724"/>
        <reference ref_id="CVE-2022-41725" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-41725"/>
        <reference ref_id="CVE-2023-24534" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24534"/>
        <reference ref_id="CVE-2023-24536" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24536"/>
        <reference ref_id="CVE-2023-24537" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24537"/>
        <reference ref_id="CVE-2023-24538" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24538"/>
        <reference ref_id="CVE-2023-24539" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24539"/>
        <reference ref_id="CVE-2023-24540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24540"/>
        <reference ref_id="CVE-2023-25173" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25173"/>
        <reference ref_id="CVE-2023-29400" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29400"/>
        <reference ref_id="CVE-2023-29406" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29406"/>
        <reference ref_id="CVE-2023-3978" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3978"/>
        <reference ref_id="ALSA-2023:6474" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6474.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
* golang.org/x/net/html: Cross site scripting (CVE-2023-3978)
* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
* containerd: Supplementary groups are not set up properly (CVE-2023-25173)
* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2174485" id="2174485"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178358" id="2178358"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178488" id="2178488"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2178492" id="2178492"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184481" id="2184481"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184482" id="2184482"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184483" id="2184483"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184484" id="2184484"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196026" id="2196026"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196027" id="2196027"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2196029" id="2196029"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222167" id="2222167"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2228689" id="2228689"></bugzilla>
          <cve public="20230217" href="https://access.redhat.com/security/cve/CVE-2022-41723" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41723</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2022-41724" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41724</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2022-41725" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-41725</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24534" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24534</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24536" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24536</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24537" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24537</cve>
          <cve public="20230404" href="https://access.redhat.com/security/cve/CVE-2023-24538" impact="Moderate" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-24538</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-24539" impact="Moderate" cwe="CWE-176" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-24539</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-24540" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-24540</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-25173" impact="Moderate" cwe="CWE-842" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L">CVE-2023-25173</cve>
          <cve public="20230420" href="https://access.redhat.com/security/cve/CVE-2023-29400" impact="Moderate" cwe="CWE-176" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-29400</cve>
          <cve public="20230711" href="https://access.redhat.com/security/cve/CVE-2023-29406" impact="Moderate" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2023-29406</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-3978" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-3978</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236474001" comment="podman is earlier than 2:4.6.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236474005" comment="podman-gvproxy is earlier than 2:4.6.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954006" comment="podman-gvproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236474007" comment="podman-plugins is earlier than 2:4.6.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236474009" comment="podman-remote is earlier than 2:4.6.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236474011" comment="podman-tests is earlier than 2:4.6.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236474003" comment="podman-docker is earlier than 2:4.6.1-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236482" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6482: librabbitmq security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6482" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6482"/>
        <reference ref_id="CVE-2023-35789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-35789"/>
        <reference ref_id="ALSA-2023:6482" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6482.html"/>
        <description>The librabbitmq packages provide an Advanced Message Queuing Protocol (AMQP) client library that allows you to communicate with AMQP servers using protocol version 0-9-1.

Security Fix(es):

* rabbitmq-c/librabbitmq: Insecure credentials submission (CVE-2023-35789)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2215762" id="2215762"></bugzilla>
          <cve public="20230616" href="https://access.redhat.com/security/cve/CVE-2023-35789" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2023-35789</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236482001" comment="librabbitmq is earlier than 0:0.11.0-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236482002" comment="librabbitmq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236482003" comment="librabbitmq-devel is earlier than 0:0.11.0-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236482004" comment="librabbitmq-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236482007" comment="librabbitmq-tools is earlier than 0:0.11.0-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236482006" comment="librabbitmq-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236494" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6494: python3.11 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6494" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6494"/>
        <reference ref_id="CVE-2007-4559" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2007-4559"/>
        <reference ref_id="CVE-2023-41105" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-41105"/>
        <reference ref_id="ALSA-2023:6494" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6494.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

The following packages have been upgraded to a later upstream version: python3.11 (3.11.5). (BZ#2210785)

Security Fix(es):

* python: tarfile module directory traversal (CVE-2007-4559)
* python: file path truncation at \0 characters (CVE-2023-41105)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/263261" id="263261"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2235795" id="2235795"></bugzilla>
          <cve public="20070824" href="https://access.redhat.com/security/cve/CVE-2007-4559" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2007-4559</cve>
          <cve public="20230823" href="https://access.redhat.com/security/cve/CVE-2023-41105" impact="Moderate" cwe="CWE-158" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-41105</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494001" comment="python3.11 is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077014" comment="python3.11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494003" comment="python3.11-debug is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077015" comment="python3.11-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494005" comment="python3.11-devel is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077016" comment="python3.11-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494007" comment="python3.11-idle is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077017" comment="python3.11-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494009" comment="python3.11-libs is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077018" comment="python3.11-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494011" comment="python3.11-test is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077019" comment="python3.11-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236494013" comment="python3.11-tkinter is earlier than 0:3.11.5-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077020" comment="python3.11-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236497" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6497: libX11 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6497" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6497"/>
        <reference ref_id="CVE-2023-3138" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3138"/>
        <reference ref_id="ALSA-2023:6497" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6497.html"/>
        <description>The libX11 packages contain the core X11 protocol client library.

Security Fix(es):

* libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow (CVE-2023-3138)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2213748" id="2213748"></bugzilla>
          <cve public="20230615" href="https://access.redhat.com/security/cve/CVE-2023-3138" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H">CVE-2023-3138</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497001" comment="libX11 is earlier than 0:1.7.0-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497002" comment="libX11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497005" comment="libX11-devel is earlier than 0:1.7.0-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497006" comment="libX11-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497007" comment="libX11-xcb is earlier than 0:1.7.0-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497008" comment="libX11-xcb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497003" comment="libX11-common is earlier than 0:1.7.0-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497004" comment="libX11-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236508" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6508: libreoffice security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6508" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6508"/>
        <reference ref_id="CVE-2022-38745" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38745"/>
        <reference ref_id="CVE-2023-0950" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0950"/>
        <reference ref_id="CVE-2023-1183" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1183"/>
        <reference ref_id="CVE-2023-2255" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2255"/>
        <reference ref_id="ALSA-2023:6508" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6508.html"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

Security Fix(es):

* libreoffice: Empty entry in Java class path (CVE-2022-38745)
* libreoffice: Array index underflow in Calc formula parsing (CVE-2023-0950)
* libreoffice: Arbitrary file write (CVE-2023-1183)
* libreoffice: Remote documents loaded without prompt via IFrame (CVE-2023-2255)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2182044" id="2182044"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2208506" id="2208506"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210185" id="2210185"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210186" id="2210186"></bugzilla>
          <cve public="20230324" href="https://access.redhat.com/security/cve/CVE-2022-38745" impact="Moderate" cwe="(CWE-427|CWE-1188)-&gt;CWE-94" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-38745</cve>
          <cve public="20230525" href="https://access.redhat.com/security/cve/CVE-2023-0950" impact="Moderate" cwe="CWE-129" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H">CVE-2023-0950</cve>
          <cve public="20230619" href="https://access.redhat.com/security/cve/CVE-2023-1183" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N">CVE-2023-1183</cve>
          <cve public="20230525" href="https://access.redhat.com/security/cve/CVE-2023-2255" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-2255</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508358" comment="libreoffice is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755359" comment="libreoffice is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508359" comment="libreoffice-base is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755361" comment="libreoffice-base is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508360" comment="libreoffice-calc is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755363" comment="libreoffice-calc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508361" comment="libreoffice-core is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755365" comment="libreoffice-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508362" comment="libreoffice-draw is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755367" comment="libreoffice-draw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508363" comment="libreoffice-emailmerge is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755369" comment="libreoffice-emailmerge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508364" comment="libreoffice-filters is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755371" comment="libreoffice-filters is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508365" comment="libreoffice-gdb-debug-support is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755373" comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508366" comment="libreoffice-graphicfilter is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755375" comment="libreoffice-graphicfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508367" comment="libreoffice-gtk3 is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755377" comment="libreoffice-gtk3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508368" comment="libreoffice-help-ar is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755379" comment="libreoffice-help-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508369" comment="libreoffice-help-bg is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755381" comment="libreoffice-help-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508370" comment="libreoffice-help-bn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755383" comment="libreoffice-help-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508371" comment="libreoffice-help-ca is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755385" comment="libreoffice-help-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508372" comment="libreoffice-help-cs is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755387" comment="libreoffice-help-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508373" comment="libreoffice-help-da is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755389" comment="libreoffice-help-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508374" comment="libreoffice-help-de is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755391" comment="libreoffice-help-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508375" comment="libreoffice-help-dz is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755393" comment="libreoffice-help-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508376" comment="libreoffice-help-el is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755395" comment="libreoffice-help-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508377" comment="libreoffice-help-en is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755397" comment="libreoffice-help-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508378" comment="libreoffice-help-eo is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755399" comment="libreoffice-help-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508379" comment="libreoffice-help-es is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755401" comment="libreoffice-help-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508380" comment="libreoffice-help-et is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755403" comment="libreoffice-help-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508381" comment="libreoffice-help-eu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755405" comment="libreoffice-help-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508382" comment="libreoffice-help-fi is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755407" comment="libreoffice-help-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508383" comment="libreoffice-help-fr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755409" comment="libreoffice-help-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508384" comment="libreoffice-help-gl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755411" comment="libreoffice-help-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508385" comment="libreoffice-help-gu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755413" comment="libreoffice-help-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508386" comment="libreoffice-help-he is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755415" comment="libreoffice-help-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508387" comment="libreoffice-help-hi is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755417" comment="libreoffice-help-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508388" comment="libreoffice-help-hr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755419" comment="libreoffice-help-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508389" comment="libreoffice-help-hu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755421" comment="libreoffice-help-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508390" comment="libreoffice-help-id is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755423" comment="libreoffice-help-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508391" comment="libreoffice-help-it is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755425" comment="libreoffice-help-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508392" comment="libreoffice-help-ja is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755427" comment="libreoffice-help-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508393" comment="libreoffice-help-ko is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755429" comment="libreoffice-help-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508394" comment="libreoffice-help-lt is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755431" comment="libreoffice-help-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508395" comment="libreoffice-help-lv is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755433" comment="libreoffice-help-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508396" comment="libreoffice-help-nb is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755435" comment="libreoffice-help-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508397" comment="libreoffice-help-nl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755437" comment="libreoffice-help-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508398" comment="libreoffice-help-nn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755439" comment="libreoffice-help-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508399" comment="libreoffice-help-pl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755441" comment="libreoffice-help-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508400" comment="libreoffice-help-pt-BR is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755443" comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508401" comment="libreoffice-help-pt-PT is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755445" comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508402" comment="libreoffice-help-ro is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755447" comment="libreoffice-help-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508403" comment="libreoffice-help-ru is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755449" comment="libreoffice-help-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508404" comment="libreoffice-help-si is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755451" comment="libreoffice-help-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508405" comment="libreoffice-help-sk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755453" comment="libreoffice-help-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508406" comment="libreoffice-help-sl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755455" comment="libreoffice-help-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508407" comment="libreoffice-help-sv is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755457" comment="libreoffice-help-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508408" comment="libreoffice-help-ta is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755459" comment="libreoffice-help-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508409" comment="libreoffice-help-tr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755461" comment="libreoffice-help-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508410" comment="libreoffice-help-uk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755463" comment="libreoffice-help-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508411" comment="libreoffice-help-zh-Hans is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755465" comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508412" comment="libreoffice-help-zh-Hant is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755467" comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508413" comment="libreoffice-impress is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755469" comment="libreoffice-impress is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508414" comment="libreoffice-langpack-af is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755471" comment="libreoffice-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508415" comment="libreoffice-langpack-ar is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755473" comment="libreoffice-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508416" comment="libreoffice-langpack-as is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755475" comment="libreoffice-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508417" comment="libreoffice-langpack-bg is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755477" comment="libreoffice-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508418" comment="libreoffice-langpack-bn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755479" comment="libreoffice-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508419" comment="libreoffice-langpack-br is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755481" comment="libreoffice-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508420" comment="libreoffice-langpack-ca is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755483" comment="libreoffice-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508421" comment="libreoffice-langpack-cs is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755485" comment="libreoffice-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508422" comment="libreoffice-langpack-cy is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755487" comment="libreoffice-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508423" comment="libreoffice-langpack-da is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755489" comment="libreoffice-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508424" comment="libreoffice-langpack-de is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755491" comment="libreoffice-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508425" comment="libreoffice-langpack-dz is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755493" comment="libreoffice-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508426" comment="libreoffice-langpack-el is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755495" comment="libreoffice-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508427" comment="libreoffice-langpack-en is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755497" comment="libreoffice-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508428" comment="libreoffice-langpack-eo is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755499" comment="libreoffice-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508429" comment="libreoffice-langpack-es is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755501" comment="libreoffice-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508430" comment="libreoffice-langpack-et is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755503" comment="libreoffice-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508431" comment="libreoffice-langpack-eu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755505" comment="libreoffice-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508432" comment="libreoffice-langpack-fa is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755507" comment="libreoffice-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508433" comment="libreoffice-langpack-fi is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755509" comment="libreoffice-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508434" comment="libreoffice-langpack-fr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755511" comment="libreoffice-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508435" comment="libreoffice-langpack-fy is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755513" comment="libreoffice-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508436" comment="libreoffice-langpack-ga is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755515" comment="libreoffice-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508437" comment="libreoffice-langpack-gl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755517" comment="libreoffice-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508438" comment="libreoffice-langpack-gu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755519" comment="libreoffice-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508439" comment="libreoffice-langpack-he is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755521" comment="libreoffice-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508440" comment="libreoffice-langpack-hi is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755523" comment="libreoffice-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508441" comment="libreoffice-langpack-hr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755525" comment="libreoffice-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508442" comment="libreoffice-langpack-hu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755527" comment="libreoffice-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508443" comment="libreoffice-langpack-id is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755529" comment="libreoffice-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508444" comment="libreoffice-langpack-it is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755531" comment="libreoffice-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508445" comment="libreoffice-langpack-ja is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755533" comment="libreoffice-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508446" comment="libreoffice-langpack-kk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755535" comment="libreoffice-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508447" comment="libreoffice-langpack-kn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755537" comment="libreoffice-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508448" comment="libreoffice-langpack-ko is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755539" comment="libreoffice-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508449" comment="libreoffice-langpack-lt is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755541" comment="libreoffice-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508450" comment="libreoffice-langpack-lv is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755543" comment="libreoffice-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508451" comment="libreoffice-langpack-mai is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755545" comment="libreoffice-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508452" comment="libreoffice-langpack-ml is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755547" comment="libreoffice-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508453" comment="libreoffice-langpack-mr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755549" comment="libreoffice-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508454" comment="libreoffice-langpack-nb is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755551" comment="libreoffice-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508455" comment="libreoffice-langpack-nl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755553" comment="libreoffice-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508456" comment="libreoffice-langpack-nn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755555" comment="libreoffice-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508457" comment="libreoffice-langpack-nr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755557" comment="libreoffice-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508458" comment="libreoffice-langpack-nso is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755559" comment="libreoffice-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508459" comment="libreoffice-langpack-or is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755561" comment="libreoffice-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508460" comment="libreoffice-langpack-pa is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755563" comment="libreoffice-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508461" comment="libreoffice-langpack-pl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755565" comment="libreoffice-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508462" comment="libreoffice-langpack-pt-BR is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755567" comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508463" comment="libreoffice-langpack-pt-PT is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755569" comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508464" comment="libreoffice-langpack-ro is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755571" comment="libreoffice-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508465" comment="libreoffice-langpack-ru is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755573" comment="libreoffice-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508466" comment="libreoffice-langpack-si is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755575" comment="libreoffice-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508467" comment="libreoffice-langpack-sk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755577" comment="libreoffice-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508468" comment="libreoffice-langpack-sl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755579" comment="libreoffice-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508469" comment="libreoffice-langpack-sr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755581" comment="libreoffice-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508470" comment="libreoffice-langpack-ss is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755583" comment="libreoffice-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508471" comment="libreoffice-langpack-st is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755585" comment="libreoffice-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508472" comment="libreoffice-langpack-sv is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755587" comment="libreoffice-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508473" comment="libreoffice-langpack-ta is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755589" comment="libreoffice-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508474" comment="libreoffice-langpack-te is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755591" comment="libreoffice-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508475" comment="libreoffice-langpack-th is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755593" comment="libreoffice-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508476" comment="libreoffice-langpack-tn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755595" comment="libreoffice-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508477" comment="libreoffice-langpack-tr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755597" comment="libreoffice-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508478" comment="libreoffice-langpack-ts is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755599" comment="libreoffice-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508479" comment="libreoffice-langpack-uk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755601" comment="libreoffice-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508480" comment="libreoffice-langpack-ve is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755603" comment="libreoffice-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508481" comment="libreoffice-langpack-xh is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755605" comment="libreoffice-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508482" comment="libreoffice-langpack-zh-Hans is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755607" comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508483" comment="libreoffice-langpack-zh-Hant is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755609" comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508484" comment="libreoffice-langpack-zu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755611" comment="libreoffice-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508485" comment="libreoffice-math is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755613" comment="libreoffice-math is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508486" comment="libreoffice-ogltrans is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755615" comment="libreoffice-ogltrans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508487" comment="libreoffice-pdfimport is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755617" comment="libreoffice-pdfimport is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508488" comment="libreoffice-pyuno is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755619" comment="libreoffice-pyuno is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508489" comment="libreoffice-sdk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755621" comment="libreoffice-sdk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508490" comment="libreoffice-sdk-doc is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755623" comment="libreoffice-sdk-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508491" comment="libreoffice-ure is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755625" comment="libreoffice-ure is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508492" comment="libreoffice-wiki-publisher is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755627" comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508493" comment="libreoffice-writer is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755629" comment="libreoffice-writer is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508494" comment="libreoffice-x11 is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755631" comment="libreoffice-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508495" comment="libreoffice-xsltfilter is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755633" comment="libreoffice-xsltfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508496" comment="libreofficekit is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755635" comment="libreofficekit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508497" comment="autocorr-af is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755637" comment="autocorr-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508498" comment="autocorr-bg is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755639" comment="autocorr-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508499" comment="autocorr-ca is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755641" comment="autocorr-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508500" comment="autocorr-cs is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755643" comment="autocorr-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508501" comment="autocorr-da is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755645" comment="autocorr-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508502" comment="autocorr-de is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755647" comment="autocorr-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508503" comment="autocorr-dsb is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755649" comment="autocorr-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508504" comment="autocorr-el is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755651" comment="autocorr-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508505" comment="autocorr-en is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755653" comment="autocorr-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508506" comment="autocorr-es is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755655" comment="autocorr-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508507" comment="autocorr-fa is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755657" comment="autocorr-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508508" comment="autocorr-fi is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755659" comment="autocorr-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508509" comment="autocorr-fr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755661" comment="autocorr-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508510" comment="autocorr-ga is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755663" comment="autocorr-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508511" comment="autocorr-hr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755665" comment="autocorr-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508512" comment="autocorr-hsb is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755667" comment="autocorr-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508513" comment="autocorr-hu is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755669" comment="autocorr-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508514" comment="autocorr-is is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755671" comment="autocorr-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508515" comment="autocorr-it is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755673" comment="autocorr-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508516" comment="autocorr-ja is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755675" comment="autocorr-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508517" comment="autocorr-ko is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755677" comment="autocorr-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508518" comment="autocorr-lb is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755679" comment="autocorr-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508519" comment="autocorr-lt is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755681" comment="autocorr-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508520" comment="autocorr-mn is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755683" comment="autocorr-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508521" comment="autocorr-nl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755685" comment="autocorr-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508522" comment="autocorr-pl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755687" comment="autocorr-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508523" comment="autocorr-pt is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755689" comment="autocorr-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508524" comment="autocorr-ro is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755691" comment="autocorr-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508525" comment="autocorr-ru is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755693" comment="autocorr-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508526" comment="autocorr-sk is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755695" comment="autocorr-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508527" comment="autocorr-sl is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755697" comment="autocorr-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508528" comment="autocorr-sr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755699" comment="autocorr-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508529" comment="autocorr-sv is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755701" comment="autocorr-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508530" comment="autocorr-tr is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755703" comment="autocorr-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508531" comment="autocorr-vi is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755705" comment="autocorr-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508532" comment="autocorr-vro is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755707" comment="autocorr-vro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508533" comment="autocorr-zh is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755709" comment="autocorr-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508534" comment="libreoffice-data is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755711" comment="libreoffice-data is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508535" comment="libreoffice-opensymbol-fonts is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755713" comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236508536" comment="libreoffice-ure-common is earlier than 1:7.1.8.1-11.el9.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755715" comment="libreoffice-ure-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236518" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6518: flatpak security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6518" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6518"/>
        <reference ref_id="CVE-2023-28100" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28100"/>
        <reference ref_id="CVE-2023-28101" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28101"/>
        <reference ref_id="ALSA-2023:6518" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6518.html"/>
        <description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

The following packages have been upgraded to a later upstream version: flatpak (1.12.8). (BZ#2221792)

Security Fix(es):

* flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console (CVE-2023-28100)
* flatpak: Metadata with ANSI control codes can cause misleading terminal output (CVE-2023-28101)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179219" id="2179219"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2179220" id="2179220"></bugzilla>
          <cve public="20230316" href="https://access.redhat.com/security/cve/CVE-2023-28100" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H">CVE-2023-28100</cve>
          <cve public="20230316" href="https://access.redhat.com/security/cve/CVE-2023-28101" impact="Moderate" cwe="CWE-116" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-28101</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518001" comment="flatpak is earlier than 0:1.12.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518002" comment="flatpak is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518003" comment="flatpak-devel is earlier than 0:1.12.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518004" comment="flatpak-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518005" comment="flatpak-libs is earlier than 0:1.12.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518006" comment="flatpak-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518009" comment="flatpak-session-helper is earlier than 0:1.12.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518010" comment="flatpak-session-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518007" comment="flatpak-selinux is earlier than 0:1.12.8-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518008" comment="flatpak-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236524" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6524: dnsmasq security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6524" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6524"/>
        <reference ref_id="CVE-2023-28450" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28450"/>
        <reference ref_id="ALSA-2023:6524" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6524.html"/>
        <description>The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

* dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 (CVE-2023-28450)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2178948" id="2178948"></bugzilla>
          <cve public="20230315" href="https://access.redhat.com/security/cve/CVE-2023-28450" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-28450</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236524001" comment="dnsmasq is earlier than 0:2.85-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070002" comment="dnsmasq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236524003" comment="dnsmasq-utils is earlier than 0:2.85-14.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070004" comment="dnsmasq-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236535" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6535: webkit2gtk3 security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2023:6535" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6535"/>
        <reference ref_id="CVE-2022-32885" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-32885"/>
        <reference ref_id="CVE-2023-27932" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27932"/>
        <reference ref_id="CVE-2023-27954" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27954"/>
        <reference ref_id="CVE-2023-28198" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28198"/>
        <reference ref_id="CVE-2023-32370" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32370"/>
        <reference ref_id="CVE-2023-32393" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32393"/>
        <reference ref_id="CVE-2023-38133" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38133"/>
        <reference ref_id="CVE-2023-38572" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38572"/>
        <reference ref_id="CVE-2023-38592" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38592"/>
        <reference ref_id="CVE-2023-38594" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38594"/>
        <reference ref_id="CVE-2023-38595" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38595"/>
        <reference ref_id="CVE-2023-38597" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38597"/>
        <reference ref_id="CVE-2023-38599" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38599"/>
        <reference ref_id="CVE-2023-38600" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38600"/>
        <reference ref_id="CVE-2023-38611" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38611"/>
        <reference ref_id="CVE-2023-39434" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39434"/>
        <reference ref_id="CVE-2023-40397" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40397"/>
        <reference ref_id="CVE-2023-40451" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40451"/>
        <reference ref_id="ALSA-2023:6535" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6535.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: arbitrary code execution (CVE-2023-32393)
* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)
* webkitgtk: arbitrary code execution (CVE-2023-38594)
* webkitgtk: arbitrary code execution (CVE-2023-38595)
* webkitgtk: arbitrary code execution (CVE-2023-38597)
* webkitgtk: arbitrary code execution (CVE-2023-38600)
* webkitgtk: arbitrary code execution (CVE-2023-38611)
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)
* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)
* webkitgtk: use after free vulnerability (CVE-2023-28198)
* webkitgtk: content security policy blacklist failure (CVE-2023-32370)
* webkitgtk: disclose sensitive information (CVE-2023-38133)
* webkitgtk: track sensitive user information (CVE-2023-38599)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-39434)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2224608" id="2224608"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231015" id="2231015"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231017" id="2231017"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231018" id="2231018"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231019" id="2231019"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231020" id="2231020"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231021" id="2231021"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231022" id="2231022"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231028" id="2231028"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231043" id="2231043"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236842" id="2236842"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236843" id="2236843"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236844" id="2236844"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238943" id="2238943"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238944" id="2238944"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238945" id="2238945"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241405" id="2241405"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241409" id="2241409"></bugzilla>
          <cve public="20230421" href="https://access.redhat.com/security/cve/CVE-2022-32885" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-32885</cve>
          <cve public="20230421" href="https://access.redhat.com/security/cve/CVE-2023-27932" impact="Moderate" cwe="CWE-942" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2023-27932</cve>
          <cve public="20230421" href="https://access.redhat.com/security/cve/CVE-2023-27954" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-27954</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-28198" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-28198</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-32370" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-32370</cve>
          <cve public="20230721" href="https://access.redhat.com/security/cve/CVE-2023-32393" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-32393</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38133" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-38133</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38572" impact="Important" cwe="CWE-942" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-38572</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38592" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38592</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38594" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38594</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38595" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38595</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38597" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38597</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38599" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-38599</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38600" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38600</cve>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-38611" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38611</cve>
          <cve public="20230928" href="https://access.redhat.com/security/cve/CVE-2023-39434" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-39434</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-40397" impact="Moderate" cwe="CWE-96" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-40397</cve>
          <cve public="20230928" href="https://access.redhat.com/security/cve/CVE-2023-40451" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-40451</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236535001" comment="webkit2gtk3 is earlier than 0:2.40.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236535003" comment="webkit2gtk3-devel is earlier than 0:2.40.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236535005" comment="webkit2gtk3-jsc is earlier than 0:2.40.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236535007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.40.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236544" version="646" class="patch">
      <metadata>
        <title>ALSA-2023:6544: ghostscript security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6544" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6544"/>
        <reference ref_id="CVE-2023-28879" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28879"/>
        <reference ref_id="CVE-2023-38559" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38559"/>
        <reference ref_id="ALSA-2023:6544" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6544.html"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: buffer overflow in base/sbcp.c leading to data corruption (CVE-2023-28879)
* ghostscript: Out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in DoS (CVE-2023-38559)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2184585" id="2184585"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224367" id="2224367"></bugzilla>
          <cve public="20230331" href="https://access.redhat.com/security/cve/CVE-2023-28879" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-28879</cve>
          <cve public="20230717" href="https://access.redhat.com/security/cve/CVE-2023-38559" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-38559</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544001" comment="ghostscript is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999016" comment="ghostscript is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544016" comment="ghostscript-tools-dvipdf is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999018" comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544007" comment="ghostscript-tools-fonts is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999019" comment="ghostscript-tools-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544009" comment="ghostscript-tools-printing is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999020" comment="ghostscript-tools-printing is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544017" comment="ghostscript-x11 is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999022" comment="ghostscript-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544013" comment="libgs is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999023" comment="libgs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544015" comment="libgs-devel is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999024" comment="libgs-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236544003" comment="ghostscript-doc is earlier than 0:9.54.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999025" comment="ghostscript-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236549" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:6549: libreswan security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6549" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6549"/>
        <reference ref_id="CVE-2023-38710" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38710"/>
        <reference ref_id="CVE-2023-38711" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38711"/>
        <reference ref_id="CVE-2023-38712" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38712"/>
        <reference ref_id="ALSA-2023:6549" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6549.html"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

Security Fix(es):

* libreswan: Invalid IKEv2 REKEY proposal causes restart (CVE-2023-38710)
* libreswan: Invalid IKEv1 Quick Mode ID causes restart (CVE-2023-38711)
* libreswan: Invalid IKEv1 repeat IKE SA delete causes crash and restart (CVE-2023-38712)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2215952" id="2215952"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225368" id="2225368"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2225369" id="2225369"></bugzilla>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-38710" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38710</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-38711" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38711</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-38712" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38712</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20236549001" comment="libreswan is earlier than 0:4.12-1.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244050002" comment="libreswan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236551" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6551: yajl security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6551" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6551"/>
        <reference ref_id="CVE-2023-33460" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-33460"/>
        <reference ref_id="ALSA-2023:6551" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6551.html"/>
        <description>Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator.

Security Fix(es):

* yajl: Memory leak in yajl_tree_parse function (CVE-2023-33460)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2221249" id="2221249"></bugzilla>
          <cve public="20230606" href="https://access.redhat.com/security/cve/CVE-2023-33460" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-33460</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236551001" comment="yajl is earlier than 0:2.1.0-22.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228252002" comment="yajl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236551003" comment="yajl-devel is earlier than 0:2.1.0-22.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228252004" comment="yajl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236566" version="641" class="patch">
      <metadata>
        <title>ALSA-2023:6566: libmicrohttpd security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6566" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6566"/>
        <reference ref_id="CVE-2023-27371" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27371"/>
        <reference ref_id="ALSA-2023:6566" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6566.html"/>
        <description>GNU libmicrohttpd is a small C library that makes it easy to run an HTTP server as part of another application.

Security Fix(es):

* libmicrohttpd: remote DoS (CVE-2023-27371)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2174313" id="2174313"></bugzilla>
          <cve public="20230228" href="https://access.redhat.com/security/cve/CVE-2023-27371" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-27371</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236566001" comment="libmicrohttpd is earlier than 1:0.9.72-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236566002" comment="libmicrohttpd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236566003" comment="libmicrohttpd-devel is earlier than 1:0.9.72-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236566004" comment="libmicrohttpd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236566005" comment="libmicrohttpd-doc is earlier than 1:0.9.72-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236566006" comment="libmicrohttpd-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236570" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6570: tomcat security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6570" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6570"/>
        <reference ref_id="CVE-2023-24998" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-24998"/>
        <reference ref_id="CVE-2023-28708" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28708"/>
        <reference ref_id="CVE-2023-28709" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28709"/>
        <reference ref_id="ALSA-2023:6570" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6570.html"/>
        <description>Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Security Fix(es):

* Apache Commons FileUpload: FileUpload DoS with excessive parts (CVE-2023-24998)
* tomcat: not including the secure attribute causes information disclosure (CVE-2023-28708)
* tomcat: Fix for CVE-2023-24998 was incomplete (CVE-2023-28709)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2172298" id="2172298"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2180856" id="2180856"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210321" id="2210321"></bugzilla>
          <cve public="20230220" href="https://access.redhat.com/security/cve/CVE-2023-24998" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-24998</cve>
          <cve public="20230322" href="https://access.redhat.com/security/cve/CVE-2023-28708" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N">CVE-2023-28708</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-28709" impact="Moderate" cwe="CWE-193" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-28709</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570001" comment="tomcat is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929002" comment="tomcat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570003" comment="tomcat-admin-webapps is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929004" comment="tomcat-admin-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570005" comment="tomcat-docs-webapp is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929006" comment="tomcat-docs-webapp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570007" comment="tomcat-el-3.0-api is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929008" comment="tomcat-el-3.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570009" comment="tomcat-jsp-2.3-api is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929010" comment="tomcat-jsp-2.3-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570011" comment="tomcat-lib is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929012" comment="tomcat-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570013" comment="tomcat-servlet-4.0-api is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929014" comment="tomcat-servlet-4.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236570015" comment="tomcat-webapps is earlier than 1:9.0.62-37.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929016" comment="tomcat-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236578" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6578: libqb security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6578" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6578"/>
        <reference ref_id="CVE-2023-39976" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39976"/>
        <reference ref_id="ALSA-2023:6578" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6578.html"/>
        <description>The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.

Security Fix(es):

* libqb: Buffer overflow in log_blackbox.c (CVE-2023-39976)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2230708" id="2230708"></bugzilla>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-39976" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2023-39976</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236578001" comment="libqb is earlier than 0:2.0.6-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236578002" comment="libqb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236578003" comment="libqb-devel is earlier than 0:2.0.6-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236578004" comment="libqb-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236595" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6595: linux-firmware security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="CVE-2023-20569" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-20569"/>
        <reference ref_id="ALSA-2023:6595" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6595.html"/>
        <reference ref_id="RHSA-2023:6595" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6595"/>
        <reference ref_id="CVE-2022-27635" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-27635"/>
        <reference ref_id="CVE-2022-36351" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36351"/>
        <reference ref_id="CVE-2022-38076" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-38076"/>
        <reference ref_id="CVE-2022-40964" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-40964"/>
        <reference ref_id="CVE-2022-46329" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-46329"/>
        <description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.

Security Fix(es):

* hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-27635)
* hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-40964)
* hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329)
* hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-36351)
* hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569)
* hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-38076)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2238964" id="2238964"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2207625" id="2207625"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238960" id="2238960"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238961" id="2238961"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238962" id="2238962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238963" id="2238963"></bugzilla>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2023-20569" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-20569</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2022-27635" impact="Important" cwe="CWE-284" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2022-27635</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2022-36351" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2022-36351</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2022-38076" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N">CVE-2022-38076</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2022-40964" impact="Important" cwe="CWE-284" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H">CVE-2022-40964</cve>
          <cve public="20230808" href="https://access.redhat.com/security/cve/CVE-2022-46329" impact="Important" cwe="CWE-693" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2022-46329</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595001" comment="iwl100-firmware is earlier than 0:39.31.5.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068002" comment="iwl100-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595003" comment="iwl1000-firmware is earlier than 1:39.31.5.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068004" comment="iwl1000-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595005" comment="iwl105-firmware is earlier than 0:18.168.6.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068006" comment="iwl105-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595007" comment="iwl135-firmware is earlier than 0:18.168.6.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068008" comment="iwl135-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595009" comment="iwl2000-firmware is earlier than 0:18.168.6.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068010" comment="iwl2000-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595011" comment="iwl2030-firmware is earlier than 0:18.168.6.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068012" comment="iwl2030-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595013" comment="iwl3160-firmware is earlier than 1:25.30.13.0-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068014" comment="iwl3160-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595015" comment="iwl5000-firmware is earlier than 0:8.83.5.1_1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068016" comment="iwl5000-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595017" comment="iwl5150-firmware is earlier than 0:8.24.2.2-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068018" comment="iwl5150-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595019" comment="iwl6000g2a-firmware is earlier than 0:18.168.6.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068020" comment="iwl6000g2a-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595021" comment="iwl6000g2b-firmware is earlier than 0:18.168.6.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068022" comment="iwl6000g2b-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595023" comment="iwl6050-firmware is earlier than 0:41.28.5.1-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068024" comment="iwl6050-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595025" comment="iwl7260-firmware is earlier than 1:25.30.13.0-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068026" comment="iwl7260-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595027" comment="libertas-sd8787-firmware is earlier than 0:20230814-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068028" comment="libertas-sd8787-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595029" comment="linux-firmware is earlier than 0:20230814-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068030" comment="linux-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595031" comment="linux-firmware-whence is earlier than 0:20230814-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068032" comment="linux-firmware-whence is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236595033" comment="netronome-firmware is earlier than 0:20230814-140.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235068034" comment="netronome-firmware is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236596" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6596: cups security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6596" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6596"/>
        <reference ref_id="CVE-2023-32324" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32324"/>
        <reference ref_id="CVE-2023-34241" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34241"/>
        <reference ref_id="ALSA-2023:6596" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6596.html"/>
        <description>The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.

Security Fix(es):

* cups: heap buffer overflow may lead to DoS (CVE-2023-32324)
* cups: use-after-free in cupsdAcceptClient() in scheduler/client.c (CVE-2023-34241)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2209603" id="2209603"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2214914" id="2214914"></bugzilla>
          <cve public="20230601" href="https://access.redhat.com/security/cve/CVE-2023-32324" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-32324</cve>
          <cve public="20230622" href="https://access.redhat.com/security/cve/CVE-2023-34241" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2023-34241</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596001" comment="cups is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776016" comment="cups is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596003" comment="cups-client is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776017" comment="cups-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596016" comment="cups-devel is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776019" comment="cups-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596009" comment="cups-ipptool is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776020" comment="cups-ipptool is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596017" comment="cups-libs is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776022" comment="cups-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596013" comment="cups-lpd is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776023" comment="cups-lpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596015" comment="cups-printerapp is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776024" comment="cups-printerapp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236596007" comment="cups-filesystem is earlier than 1:2.3.3op2-21.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776025" comment="cups-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236621" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6621: protobuf-c security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6621" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6621"/>
        <reference ref_id="CVE-2022-48468" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48468"/>
        <reference ref_id="ALSA-2023:6621" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6621.html"/>
        <description>The protobuf-c packages provide C bindings for Google's Protocol Buffers.

Security Fix(es):

* protobuf-c: unsigned integer overflow in parse_required_member (CVE-2022-48468)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2186673" id="2186673"></bugzilla>
          <cve public="20230413" href="https://access.redhat.com/security/cve/CVE-2022-48468" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-48468</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236621001" comment="protobuf-c is earlier than 0:1.3.3-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236621002" comment="protobuf-c is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236621003" comment="protobuf-c-compiler is earlier than 0:1.3.3-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236621004" comment="protobuf-c-compiler is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236621005" comment="protobuf-c-devel is earlier than 0:1.3.3-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236621006" comment="protobuf-c-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236631" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6631: glib2 security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2023:6631" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6631"/>
        <reference ref_id="CVE-2023-29499" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29499"/>
        <reference ref_id="CVE-2023-32611" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32611"/>
        <reference ref_id="CVE-2023-32665" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32665"/>
        <reference ref_id="ALSA-2023:6631" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6631.html"/>
        <description>GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

* glib: GVariant offset table entry size is not checked in is_normal() (CVE-2023-29499)
* glib: g_variant_byteswap() can take a long time with some non-normal inputs (CVE-2023-32611)
* glib: GVariant deserialisation does not match spec for non-normal data (CVE-2023-32665)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2211827" id="2211827"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2211828" id="2211828"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2211829" id="2211829"></bugzilla>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-29499" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-29499</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-32611" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-32611</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-32665" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-32665</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631001" comment="glib2 is earlier than 0:2.68.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631002" comment="glib2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631003" comment="glib2-devel is earlier than 0:2.68.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631004" comment="glib2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631007" comment="glib2-static is earlier than 0:2.68.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631008" comment="glib2-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631011" comment="glib2-tests is earlier than 0:2.68.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631010" comment="glib2-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631005" comment="glib2-doc is earlier than 0:2.68.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236631006" comment="glib2-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249459" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9459: buildah security update (Important)</title>
        <reference ref_id="CVE-2024-9341" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9341"/>
        <reference ref_id="CVE-2024-9407" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9407"/>
        <reference ref_id="CVE-2024-9675" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9675"/>
        <reference ref_id="CVE-2024-9676" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9676"/>
        <reference ref_id="CVE-2024-34155" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34155"/>
        <reference ref_id="CVE-2024-34156" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34156"/>
        <reference ref_id="CVE-2024-34158" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34158"/>
        <reference ref_id="RHSA-2024:9459" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9459"/>
        <reference ref_id="ALSA-2024:9459" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9459.html"/>
        <description>The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.   

Security Fix(es):  

  * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
  * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
  * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
  * Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341)
  * Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407)
  * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
  * Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2310527" id="2310527"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2310528" id="2310528"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2310529" id="2310529"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2315691" id="2315691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2315887" id="2315887"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2317458" id="2317458"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2317467" id="2317467"></bugzilla>
          <cve public="20241001" href="https://access.redhat.com/security/cve/CVE-2024-9341" impact="Moderate" cwe="CWE-59" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N">CVE-2024-9341</cve>
          <cve public="20241001" href="https://access.redhat.com/security/cve/CVE-2024-9407" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N">CVE-2024-9407</cve>
          <cve public="20241009" href="https://access.redhat.com/security/cve/CVE-2024-9675" impact="Important" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2024-9675</cve>
          <cve public="20241015" href="https://access.redhat.com/security/cve/CVE-2024-9676" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-9676</cve>
          <cve public="20240906" href="https://access.redhat.com/security/cve/CVE-2024-34155" impact="Moderate" cwe="CWE-674" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34155</cve>
          <cve public="20240906" href="https://access.redhat.com/security/cve/CVE-2024-34156" impact="Important" cwe="CWE-674" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34156</cve>
          <cve public="20240906" href="https://access.redhat.com/security/cve/CVE-2024-34158" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-34158</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249459001" comment="buildah is earlier than 2:1.37.5-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228008002" comment="buildah is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249459002" comment="buildah-tests is earlier than 2:1.37.5-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228008004" comment="buildah-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236632" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6632: shadow-utils security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2023:6632" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6632"/>
        <reference ref_id="CVE-2023-4641" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4641"/>
        <reference ref_id="ALSA-2023:6632" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6632.html"/>
        <description>The shadow-utils packages include programs for converting UNIX password files to the shadow password format, as well as utilities for managing user and group accounts. 

Security Fix(es):

* shadow-utils: possible password leak during passwd(1) change (CVE-2023-4641)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2215945" id="2215945"></bugzilla>
          <cve public="20230617" href="https://access.redhat.com/security/cve/CVE-2023-4641" impact="Low" cwe="CWE-303" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-4641</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236632001" comment="shadow-utils is earlier than 2:4.9-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236632002" comment="shadow-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236632007" comment="shadow-utils-subid is earlier than 2:4.9-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236632004" comment="shadow-utils-subid is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236632008" comment="shadow-utils-subid-devel is earlier than 2:4.9-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236632006" comment="shadow-utils-subid-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236635" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:6635: c-ares security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6635" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6635"/>
        <reference ref_id="CVE-2022-4904" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4904"/>
        <reference ref_id="CVE-2023-31124" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31124"/>
        <reference ref_id="CVE-2023-31130" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31130"/>
        <reference ref_id="CVE-2023-31147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31147"/>
        <reference ref_id="ALSA-2023:6635" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6635.html"/>
        <description>The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.

The following packages have been upgraded to a later upstream version: c-ares (1.19.1). (BZ#2210370)

Security Fix(es):

* c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
* c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
* c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2168631" id="2168631"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209494" id="2209494"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209497" id="2209497"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2209501" id="2209501"></bugzilla>
          <cve public="20221213" href="https://access.redhat.com/security/cve/CVE-2022-4904" impact="Moderate" cwe="CWE-20-&gt;CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2022-4904</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-31124" impact="Low" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-31124</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-31130" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-31130</cve>
          <cve public="20230522" href="https://access.redhat.com/security/cve/CVE-2023-31147" impact="Moderate" cwe="CWE-330" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-31147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236635001" comment="c-ares is earlier than 0:1.19.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243842004" comment="c-ares is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236635003" comment="c-ares-devel is earlier than 0:1.19.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243842005" comment="c-ares-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248678" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8678: grafana security update (Important)</title>
        <reference ref_id="CVE-2024-9355" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-9355"/>
        <reference ref_id="CVE-2024-47875" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-47875"/>
        <reference ref_id="RHSA-2024:8678" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8678"/>
        <reference ref_id="ALSA-2024:8678" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8678.html"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB.   

Security Fix(es):  

  * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355)
  * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-30"/>
          <updated date="2024-10-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2315719" id="2315719"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2318052" id="2318052"></bugzilla>
          <cve public="20240930" href="https://access.redhat.com/security/cve/CVE-2024-9355" impact="Moderate" cwe="CWE-457" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L">CVE-2024-9355</cve>
          <cve public="20241011" href="https://access.redhat.com/security/cve/CVE-2024-47875" impact="Important" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N">CVE-2024-47875</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248678001" comment="grafana is earlier than 0:9.2.10-19.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225716002" comment="grafana is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248678002" comment="grafana-selinux is earlier than 0:9.2.10-19.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242568004" comment="grafana-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236643" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6643: libssh security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6643" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6643"/>
        <reference ref_id="CVE-2023-1667" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1667"/>
        <reference ref_id="CVE-2023-2283" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2283"/>
        <reference ref_id="ALSA-2023:6643" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6643.html"/>
        <description>libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.

Security Fix(es):

* libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)
* libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2182199" id="2182199"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2189736" id="2189736"></bugzilla>
          <cve public="20230430" href="https://access.redhat.com/security/cve/CVE-2023-1667" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2023-1667</cve>
          <cve public="20230505" href="https://access.redhat.com/security/cve/CVE-2023-2283" impact="Moderate" cwe="CWE-287" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2023-2283</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643001" comment="libssh is earlier than 0:0.10.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643002" comment="libssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643005" comment="libssh-devel is earlier than 0:0.10.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643006" comment="libssh-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643003" comment="libssh-config is earlier than 0:0.10.4-11.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643004" comment="libssh-config is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236659" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6659: python3.9 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6659" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6659"/>
        <reference ref_id="CVE-2007-4559" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2007-4559"/>
        <reference ref_id="ALSA-2023:6659" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6659.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

The following packages have been upgraded to a later upstream version: python3.9 (3.9.18). (BZ#2210783)

Security Fix(es):

* python: tarfile module directory traversal (CVE-2007-4559)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/263261" id="263261"></bugzilla>
          <cve public="20070824" href="https://access.redhat.com/security/cve/CVE-2007-4559" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2007-4559</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659003" comment="python3 is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659005" comment="python3-debug is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659007" comment="python3-devel is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659009" comment="python3-idle is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659011" comment="python3-libs is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659013" comment="python3-test is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659015" comment="python3-tkinter is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236659001" comment="python-unversioned-command is earlier than 0:3.9.18-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249470" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9470: cups security update (Low)</title>
        <reference ref_id="CVE-2024-47175" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-47175"/>
        <reference ref_id="RHSA-2024:9470" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9470"/>
        <reference ref_id="ALSA-2024:9470" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9470.html"/>
        <description>The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.  

Security Fix(es):  

  * cups: libppd: remote command injection via attacker controlled data in PPD file ()


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-12"/>
          <updated date="2024-11-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2314256" id="2314256"></bugzilla>
          <cve public="20240926" href="https://access.redhat.com/security/cve/CVE-2024-47175" impact="Important" cwe="CWE-77" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L">CVE-2024-47175</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470001" comment="cups-client is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776017" comment="cups-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470002" comment="cups-devel is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776019" comment="cups-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470003" comment="cups-ipptool is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776020" comment="cups-ipptool is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470004" comment="cups-libs is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776022" comment="cups-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470005" comment="cups-lpd is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776023" comment="cups-lpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470006" comment="cups is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776016" comment="cups is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470007" comment="cups-printerapp is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776024" comment="cups-printerapp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249470008" comment="cups-filesystem is earlier than 1:2.3.3op2-31.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244776025" comment="cups-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202411486" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:11486: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2024-27399" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27399"/>
        <reference ref_id="CVE-2024-38564" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38564"/>
        <reference ref_id="CVE-2024-45020" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-45020"/>
        <reference ref_id="CVE-2024-46697" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-46697"/>
        <reference ref_id="CVE-2024-47675" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-47675"/>
        <reference ref_id="CVE-2024-49888" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-49888"/>
        <reference ref_id="CVE-2024-50099" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50099"/>
        <reference ref_id="CVE-2024-50110" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50110"/>
        <reference ref_id="CVE-2024-50115" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50115"/>
        <reference ref_id="CVE-2024-50124" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50124"/>
        <reference ref_id="CVE-2024-50125" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50125"/>
        <reference ref_id="CVE-2024-50142" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50142"/>
        <reference ref_id="CVE-2024-50148" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50148"/>
        <reference ref_id="CVE-2024-50192" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50192"/>
        <reference ref_id="CVE-2024-50223" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50223"/>
        <reference ref_id="CVE-2024-50255" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50255"/>
        <reference ref_id="CVE-2024-50262" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50262"/>
        <reference ref_id="RHSA-2024:11486" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:11486"/>
        <reference ref_id="ALSA-2024:11486" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-11486.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)
  * kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564)
  * kernel: bpf: Fix a kernel verifier crash in stacksafe() (CVE-2024-45020)
  * kernel: nfsd: ensure that nfsd4_fattr_args.context is zeroed out (CVE-2024-46697)
  * kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (CVE-2024-47675)
  * kernel: bpf: Fix a sdiv overflow issue (CVE-2024-49888)
  * kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099)
  * kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110)
  * kernel: Bluetooth: SCO: Fix UAF on sco_sock_timeout (CVE-2024-50125)
  * kernel: Bluetooth: ISO: Fix UAF on iso_sock_timeout (CVE-2024-50124)
  * kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (CVE-2024-50115)
  * kernel: xfrm: validate new SA&amp;#39;s prefixlen using SA family when sel.family is unset (CVE-2024-50142)
  * kernel: Bluetooth: bnep: fix wild-memory-access in proto_unregister (CVE-2024-50148)
  * kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192)
  * kernel: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (CVE-2024-50255)
  * kernel: sched/numa: Fix the potential null pointer dereference in task_numa_work() (CVE-2024-50223)
  * kernel: bpf: Fix out-of-bounds write in trie_get_next_key() (CVE-2024-50262)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2024-12-19"/>
          <updated date="2024-12-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2280462" id="2280462"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293429" id="2293429"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2311717" id="2311717"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2312085" id="2312085"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2320254" id="2320254"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2320517" id="2320517"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2323904" id="2323904"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2323930" id="2323930"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2323937" id="2323937"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2323944" id="2323944"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2323955" id="2323955"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324315" id="2324315"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324332" id="2324332"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324612" id="2324612"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324867" id="2324867"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324868" id="2324868"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324892" id="2324892"></bugzilla>
          <cve public="20240513" href="https://access.redhat.com/security/cve/CVE-2024-27399" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27399</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38564" impact="Low" cwe="CWE-665" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38564</cve>
          <cve public="20240911" href="https://access.redhat.com/security/cve/CVE-2024-45020" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H">CVE-2024-45020</cve>
          <cve public="20240913" href="https://access.redhat.com/security/cve/CVE-2024-46697" impact="Moderate" cwe="CWE-457" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-46697</cve>
          <cve public="20241021" href="https://access.redhat.com/security/cve/CVE-2024-47675" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-47675</cve>
          <cve public="20241021" href="https://access.redhat.com/security/cve/CVE-2024-49888" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-49888</cve>
          <cve public="20241105" href="https://access.redhat.com/security/cve/CVE-2024-50099" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50099</cve>
          <cve public="20241105" href="https://access.redhat.com/security/cve/CVE-2024-50110" impact="Moderate" cwe="CWE-908" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-50110</cve>
          <cve public="20241105" href="https://access.redhat.com/security/cve/CVE-2024-50115" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-50115</cve>
          <cve public="20241105" href="https://access.redhat.com/security/cve/CVE-2024-50124" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50124</cve>
          <cve public="20241105" href="https://access.redhat.com/security/cve/CVE-2024-50125" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2024-50125</cve>
          <cve public="20241107" href="https://access.redhat.com/security/cve/CVE-2024-50142" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50142</cve>
          <cve public="20241107" href="https://access.redhat.com/security/cve/CVE-2024-50148" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50148</cve>
          <cve public="20241108" href="https://access.redhat.com/security/cve/CVE-2024-50192" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50192</cve>
          <cve public="20241109" href="https://access.redhat.com/security/cve/CVE-2024-50223" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50223</cve>
          <cve public="20241109" href="https://access.redhat.com/security/cve/CVE-2024-50255" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50255</cve>
          <cve public="20241109" href="https://access.redhat.com/security/cve/CVE-2024-50262" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-50262</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486001" comment="bpftool is earlier than 0:7.4.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486002" comment="kernel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486003" comment="kernel-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486004" comment="kernel-debug is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486005" comment="kernel-debug-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486006" comment="kernel-debug-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486008" comment="kernel-debug-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486012" comment="kernel-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486013" comment="kernel-devel-matched is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486014" comment="kernel-headers is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486015" comment="kernel-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486016" comment="kernel-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486017" comment="kernel-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486018" comment="kernel-tools is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486019" comment="kernel-tools-libs is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486020" comment="kernel-uki-virt is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486021" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486022" comment="perf is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486023" comment="python3-perf is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486024" comment="rtla is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486025" comment="rv is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486026" comment="kernel-zfcpdump is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486027" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486028" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486029" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486030" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486031" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486032" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486033" comment="kernel-rt is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486034" comment="kernel-rt-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486035" comment="kernel-rt-debug is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486036" comment="kernel-rt-debug-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486037" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486038" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486039" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486040" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486041" comment="kernel-rt-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486042" comment="kernel-rt-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486043" comment="kernel-rt-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486044" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486045" comment="kernel-64k is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486046" comment="kernel-64k-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486047" comment="kernel-64k-debug is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486048" comment="kernel-64k-debug-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486049" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486050" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486051" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486052" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486053" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486054" comment="kernel-64k-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486055" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486056" comment="kernel-64k-modules is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486057" comment="kernel-64k-modules-core is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486058" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486059" comment="kernel-cross-headers is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486060" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486061" comment="libperf is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486062" comment="kernel-abi-stablelists is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202411486063" comment="kernel-doc is earlier than 0:5.14.0-503.19.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236661" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6661: gmp security and enhancement update (Low)</title>
        <reference ref_id="RHSA-2023:6661" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6661"/>
        <reference ref_id="CVE-2021-43618" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-43618"/>
        <reference ref_id="ALSA-2023:6661" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6661.html"/>
        <description>The gmp packages contain GNU MP, a library for arbitrary precision arithmetics, signed integers operations, rational numbers, and floating point numbers. 

Security Fix(es):

* gmp: Integer overflow and resultant buffer overflow via crafted input (CVE-2021-43618)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2024904" id="2024904"></bugzilla>
          <cve public="20211115" href="https://access.redhat.com/security/cve/CVE-2021-43618" impact="Low" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-43618</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236661001" comment="gmp is earlier than 1:6.2.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236661002" comment="gmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236661003" comment="gmp-c++ is earlier than 1:6.2.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236661004" comment="gmp-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236661005" comment="gmp-devel is earlier than 1:6.2.0-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236661006" comment="gmp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249541" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9541: expat security update (Moderate)</title>
        <reference ref_id="CVE-2024-50602" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-50602"/>
        <reference ref_id="RHSA-2024:9541" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9541"/>
        <reference ref_id="ALSA-2024:9541" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9541.html"/>
        <description>Expat is a C library for parsing XML documents.  

Security Fix(es):  

  * libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-13"/>
          <updated date="2024-11-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2321987" id="2321987"></bugzilla>
          <cve public="20241027" href="https://access.redhat.com/security/cve/CVE-2024-50602" impact="Moderate" cwe="CWE-754" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-50602</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249541001" comment="expat is earlier than 0:2.5.0-3.el9_5.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244002" comment="expat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249541002" comment="expat-devel is earlier than 0:2.5.0-3.el9_5.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244004" comment="expat-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236667" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6667: samba security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2023:6667" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6667"/>
        <reference ref_id="CVE-2022-2127" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-2127"/>
        <reference ref_id="CVE-2023-34966" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34966"/>
        <reference ref_id="CVE-2023-34967" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34967"/>
        <reference ref_id="CVE-2023-34968" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34968"/>
        <reference ref_id="ALSA-2023:6667" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6667.html"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version: samba (4.18.6). (BZ#2190415)

Security Fix(es):

* samba: out-of-bounds read in winbind AUTH_CRAP (CVE-2022-2127)
* samba: infinite loop in mdssvc RPC service for spotlight (CVE-2023-34966)
* samba: type confusion in mdssvc RPC service for spotlight (CVE-2023-34967)
* samba: spotlight server-side share path disclosure (CVE-2023-34968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222791" id="2222791"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222793" id="2222793"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222794" id="2222794"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222795" id="2222795"></bugzilla>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2022-2127" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-2127</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-34966" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-34966</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-34967" impact="Moderate" cwe="CWE-843" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-34967</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-34968" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-34968</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667001" comment="ctdb is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317002" comment="ctdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667068" comment="libnetapi is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519004" comment="libnetapi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667069" comment="libnetapi-devel is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519006" comment="libnetapi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667070" comment="libsmbclient is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317004" comment="libsmbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667071" comment="libsmbclient-devel is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317006" comment="libsmbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667072" comment="libwbclient is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317008" comment="libwbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667073" comment="libwbclient-devel is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317010" comment="libwbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667074" comment="python3-samba is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317012" comment="python3-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667075" comment="python3-samba-dc is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519018" comment="python3-samba-dc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667076" comment="python3-samba-devel is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519020" comment="python3-samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667077" comment="python3-samba-test is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519022" comment="python3-samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667078" comment="samba is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317014" comment="samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667079" comment="samba-client is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317016" comment="samba-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667080" comment="samba-client-libs is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317018" comment="samba-client-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667081" comment="samba-common-libs is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317022" comment="samba-common-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667082" comment="samba-common-tools is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317024" comment="samba-common-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667083" comment="samba-dc-libs is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519036" comment="samba-dc-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667084" comment="samba-dcerpc is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519038" comment="samba-dcerpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667085" comment="samba-devel is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317026" comment="samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667086" comment="samba-krb5-printing is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317028" comment="samba-krb5-printing is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667087" comment="samba-ldb-ldap-modules is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519044" comment="samba-ldb-ldap-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667088" comment="samba-libs is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317030" comment="samba-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667089" comment="samba-test is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317034" comment="samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667090" comment="samba-test-libs is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317036" comment="samba-test-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667091" comment="samba-tools is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519054" comment="samba-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667092" comment="samba-usershares is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519056" comment="samba-usershares is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667093" comment="samba-vfs-iouring is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317038" comment="samba-vfs-iouring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667094" comment="samba-winbind is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317040" comment="samba-winbind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667095" comment="samba-winbind-clients is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317042" comment="samba-winbind-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667096" comment="samba-winbind-krb5-locator is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317044" comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667097" comment="samba-winbind-modules is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317046" comment="samba-winbind-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667098" comment="samba-winexe is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317048" comment="samba-winexe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667029" comment="samba-common is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317020" comment="samba-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236667047" comment="samba-pidl is earlier than 0:4.18.6-100.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317032" comment="samba-pidl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236679" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6679: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6679" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6679"/>
        <reference ref_id="CVE-2023-27533" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27533"/>
        <reference ref_id="CVE-2023-27534" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27534"/>
        <reference ref_id="CVE-2023-27536" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27536"/>
        <reference ref_id="CVE-2023-27538" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27538"/>
        <reference ref_id="ALSA-2023:6679" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6679.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: GSS delegation too eager connection re-use (CVE-2023-27536)
* curl: TELNET option IAC injection (CVE-2023-27533)
* curl: SFTP path ~ resolving discrepancy (CVE-2023-27534)
* curl: SSH connection too eager reuse still (CVE-2023-27538)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179062" id="2179062"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2179069" id="2179069"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2179092" id="2179092"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2179103" id="2179103"></bugzilla>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2023-27533" impact="Low" cwe="CWE-75" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2023-27533</cve>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2023-27534" impact="Low" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-27534</cve>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2023-27536" impact="Moderate" cwe="CWE-305" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-27536</cve>
          <cve public="20230320" href="https://access.redhat.com/security/cve/CVE-2023-27538" impact="Low" cwe="CWE-305" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-27538</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236679001" comment="curl is earlier than 0:7.76.1-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236679003" comment="curl-minimal is earlier than 0:7.76.1-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236679010" comment="libcurl is earlier than 0:7.76.1-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236679011" comment="libcurl-devel is earlier than 0:7.76.1-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236679012" comment="libcurl-minimal is earlier than 0:7.76.1-26.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236698" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6698: ncurses security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6698" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6698"/>
        <reference ref_id="CVE-2023-29491" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29491"/>
        <reference ref_id="ALSA-2023:6698" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6698.html"/>
        <description>The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.

Security Fix(es):

* ncurses: Local users can trigger security-relevant memory corruption via malformed data (CVE-2023-29491)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2191704" id="2191704"></bugzilla>
          <cve public="20230412" href="https://access.redhat.com/security/cve/CVE-2023-29491" impact="Moderate" cwe="CWE-787-&gt;CWE-121" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-29491</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698001" comment="ncurses is earlier than 0:6.2-10.20210508.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698002" comment="ncurses is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698013" comment="ncurses-c++-libs is earlier than 0:6.2-10.20210508.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698006" comment="ncurses-c++-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698014" comment="ncurses-devel is earlier than 0:6.2-10.20210508.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698008" comment="ncurses-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698015" comment="ncurses-libs is earlier than 0:6.2-10.20210508.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698010" comment="ncurses-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698003" comment="ncurses-base is earlier than 0:6.2-10.20210508.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698004" comment="ncurses-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698011" comment="ncurses-term is earlier than 0:6.2-10.20210508.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236698012" comment="ncurses-term is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236699" version="640" class="patch">
      <metadata>
        <title>ALSA-2023:6699: krb5 security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6699" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6699"/>
        <reference ref_id="CVE-2023-36054" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36054"/>
        <reference ref_id="CVE-2023-39975" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39975"/>
        <reference ref_id="ALSA-2023:6699" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6699.html"/>
        <description>Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

Security Fix(es):

* krb5: Denial of service through freeing uninitialized pointer (CVE-2023-36054)
* krb5: double-free in KDC TGS processing (CVE-2023-39975)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2230178" id="2230178"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2232682" id="2232682"></bugzilla>
          <cve public="20230807" href="https://access.redhat.com/security/cve/CVE-2023-36054" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-36054</cve>
          <cve public="20230816" href="https://access.redhat.com/security/cve/CVE-2023-39975" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-39975</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699001" comment="krb5-devel is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637002" comment="krb5-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699003" comment="krb5-libs is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637004" comment="krb5-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699005" comment="krb5-pkinit is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637006" comment="krb5-pkinit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699007" comment="krb5-server is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637008" comment="krb5-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699009" comment="krb5-server-ldap is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637010" comment="krb5-server-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699014" comment="krb5-workstation is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637012" comment="krb5-workstation is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236699013" comment="libkadm5 is earlier than 0:1.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228637014" comment="libkadm5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249548" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9548: openexr security update (Important)</title>
        <reference ref_id="CVE-2023-5841" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5841"/>
        <reference ref_id="RHSA-2024:9548" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9548"/>
        <reference ref_id="ALSA-2024:9548" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9548.html"/>
        <description>OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.  

Security Fix(es):  

  * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-13"/>
          <updated date="2024-11-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262397" id="2262397"></bugzilla>
          <cve public="20240201" href="https://access.redhat.com/security/cve/CVE-2023-5841" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-5841</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249548001" comment="openexr is earlier than 0:3.1.1-2.el9_5.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800002" comment="openexr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249548002" comment="openexr-libs is earlier than 0:3.1.1-2.el9_5.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800004" comment="openexr-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249548003" comment="openexr-devel is earlier than 0:3.1.1-2.el9_5.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800006" comment="openexr-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236705" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6705: procps-ng security and bug fix update (Low)</title>
        <reference ref_id="RHSA-2023:6705" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6705"/>
        <reference ref_id="CVE-2023-4016" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4016"/>
        <reference ref_id="ALSA-2023:6705" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6705.html"/>
        <description>The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.

Security Fix(es):

* procps: ps buffer overflow (CVE-2023-4016)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228494" id="2228494"></bugzilla>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-4016" impact="Low" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2023-4016</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236705001" comment="procps-ng is earlier than 0:3.3.17-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236705002" comment="procps-ng is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236705003" comment="procps-ng-devel is earlier than 0:3.3.17-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236705004" comment="procps-ng-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236705005" comment="procps-ng-i18n is earlier than 0:3.3.17-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236705006" comment="procps-ng-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248617" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8617: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2021-47383" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47383"/>
        <reference ref_id="CVE-2024-2201" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2201"/>
        <reference ref_id="CVE-2024-26640" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26640"/>
        <reference ref_id="CVE-2024-26826" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26826"/>
        <reference ref_id="CVE-2024-26923" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26923"/>
        <reference ref_id="CVE-2024-26935" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26935"/>
        <reference ref_id="CVE-2024-26961" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26961"/>
        <reference ref_id="CVE-2024-36244" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36244"/>
        <reference ref_id="CVE-2024-39472" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39472"/>
        <reference ref_id="CVE-2024-39504" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39504"/>
        <reference ref_id="CVE-2024-40904" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40904"/>
        <reference ref_id="CVE-2024-40931" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40931"/>
        <reference ref_id="CVE-2024-40960" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40960"/>
        <reference ref_id="CVE-2024-40972" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40972"/>
        <reference ref_id="CVE-2024-40977" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40977"/>
        <reference ref_id="CVE-2024-40995" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40995"/>
        <reference ref_id="CVE-2024-40998" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40998"/>
        <reference ref_id="CVE-2024-41005" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41005"/>
        <reference ref_id="CVE-2024-41013" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41013"/>
        <reference ref_id="CVE-2024-41014" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41014"/>
        <reference ref_id="CVE-2024-43854" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-43854"/>
        <reference ref_id="CVE-2024-45018" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-45018"/>
        <reference ref_id="RHSA-2024:8617" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8617"/>
        <reference ref_id="ALSA-2024:8617" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8617.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)
  * kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)
  * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
  * kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)
  * kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961)
  * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)
  * kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)
  * kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)
  * kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)
  * kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)
  * kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)
  * kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)
  * kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)
  * kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)
  * kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)
  * kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)
  * kernel: ext4: fix uninitialized ratelimit_state-&amp;gt;lock access in __ext4_fill_super() (CVE-2024-40998)
  * kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005)
  * kernel: xfs: don&amp;#39;t walk off the end of a directory data block (CVE-2024-41013)
  * kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014)
  * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
  * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-30"/>
          <updated date="2024-10-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268118" id="2268118"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270100" id="2270100"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275604" id="2275604"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277171" id="2277171"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278176" id="2278176"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278235" id="2278235"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282357" id="2282357"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293654" id="2293654"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2296067" id="2296067"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297476" id="2297476"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297488" id="2297488"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297515" id="2297515"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297544" id="2297544"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297556" id="2297556"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297561" id="2297561"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297579" id="2297579"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297582" id="2297582"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297589" id="2297589"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300296" id="2300296"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300297" id="2300297"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2311715" id="2311715"></bugzilla>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2021-47383" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2021-47383</cve>
          <cve public="20240409" href="https://access.redhat.com/security/cve/CVE-2024-2201" impact="Moderate" cwe="CWE-1423" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-2201</cve>
          <cve public="20240318" href="https://access.redhat.com/security/cve/CVE-2024-26640" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26640</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26826" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26826</cve>
          <cve public="20240424" href="https://access.redhat.com/security/cve/CVE-2024-26923" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-26923</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26935" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26935</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26961" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26961</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-36244" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36244</cve>
          <cve public="20240705" href="https://access.redhat.com/security/cve/CVE-2024-39472" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-39472</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-39504" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-39504</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40904" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40904</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40931" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40931</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40960" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40960</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40972" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40972</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40977" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40977</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40995" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40995</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40998" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40998</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-41005" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-41005</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41013" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2024-41013</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41014" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H">CVE-2024-41014</cve>
          <cve public="20240817" href="https://access.redhat.com/security/cve/CVE-2024-43854" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-43854</cve>
          <cve public="20240911" href="https://access.redhat.com/security/cve/CVE-2024-45018" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-45018</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617001" comment="perf is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617002" comment="bpftool is earlier than 0:7.3.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617003" comment="kernel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617004" comment="kernel-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617005" comment="kernel-debug is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617006" comment="kernel-debug-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617007" comment="kernel-debug-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617008" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617009" comment="kernel-debug-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617010" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617011" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617012" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617013" comment="kernel-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617014" comment="kernel-devel-matched is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617015" comment="kernel-headers is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617016" comment="kernel-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617017" comment="kernel-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617018" comment="kernel-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617019" comment="kernel-tools is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617020" comment="kernel-tools-libs is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617021" comment="kernel-uki-virt is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617022" comment="python3-perf is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617023" comment="rtla is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617024" comment="rv is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617025" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617026" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617027" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617028" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617029" comment="kernel-rt is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617030" comment="kernel-rt-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617031" comment="kernel-rt-debug is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617032" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617033" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617034" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617035" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617036" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617037" comment="kernel-rt-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617038" comment="kernel-rt-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617039" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617040" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617041" comment="kernel-64k is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617042" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617043" comment="kernel-64k-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617044" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617045" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617046" comment="kernel-cross-headers is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617047" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617048" comment="libperf is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617049" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617050" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617051" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617052" comment="kernel-64k-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617053" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617054" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617055" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617056" comment="kernel-64k-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617057" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617058" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617059" comment="kernel-64k-debug is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617060" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248617062" comment="kernel-doc is earlier than 0:5.14.0-427.42.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249559" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9559: libsoup security update (Important)</title>
        <reference ref_id="CVE-2024-52530" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-52530"/>
        <reference ref_id="CVE-2024-52532" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-52532"/>
        <reference ref_id="RHSA-2024:9559" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9559"/>
        <reference ref_id="ALSA-2024:9559" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9559.html"/>
        <description>The libsoup packages provide an HTTP client and server library for GNOME.  

Security Fix(es):  

  * libsoup: infinite loop while reading websocket data (CVE-2024-52532)
  * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-13"/>
          <updated date="2024-11-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2325276" id="2325276"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2325284" id="2325284"></bugzilla>
          <cve public="20241111" href="https://access.redhat.com/security/cve/CVE-2024-52530" impact="Important" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-52530</cve>
          <cve public="20241111" href="https://access.redhat.com/security/cve/CVE-2024-52532" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-52532</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249559001" comment="libsoup is earlier than 0:2.72.0-8.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249559002" comment="libsoup is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249559003" comment="libsoup-devel is earlier than 0:2.72.0-8.el9_5.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249559004" comment="libsoup-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236707" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6707: avahi security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6707" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6707"/>
        <reference ref_id="CVE-2021-3468" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3468"/>
        <reference ref_id="CVE-2021-3502" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-3502"/>
        <reference ref_id="CVE-2023-1981" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1981"/>
        <reference ref_id="ALSA-2023:6707" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6707.html"/>
        <description>Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.

Security Fix(es):

* avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket (CVE-2021-3468)
* avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames (CVE-2021-3502)
* avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1939614" id="1939614"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1946914" id="1946914"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2185911" id="2185911"></bugzilla>
          <cve public="20210310" href="https://access.redhat.com/security/cve/CVE-2021-3468" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2021-3468</cve>
          <cve public="20210329" href="https://access.redhat.com/security/cve/CVE-2021-3502" impact="Moderate" cwe="CWE-617-&gt;CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-3502</cve>
          <cve public="20220426" href="https://access.redhat.com/security/cve/CVE-2023-1981" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-1981</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707001" comment="avahi is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707002" comment="avahi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707003" comment="avahi-compat-howl is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707004" comment="avahi-compat-howl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707005" comment="avahi-compat-howl-devel is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707006" comment="avahi-compat-howl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707007" comment="avahi-compat-libdns_sd is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707008" comment="avahi-compat-libdns_sd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707009" comment="avahi-compat-libdns_sd-devel is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707010" comment="avahi-compat-libdns_sd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707011" comment="avahi-devel is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707012" comment="avahi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707013" comment="avahi-glib is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707014" comment="avahi-glib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707015" comment="avahi-glib-devel is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707016" comment="avahi-glib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707017" comment="avahi-libs is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707018" comment="avahi-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707021" comment="avahi-tools is earlier than 0:0.8-15.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707020" comment="avahi-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249827" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9827: libvpx security update (Moderate)</title>
        <reference ref_id="CVE-2024-5197" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5197"/>
        <reference ref_id="RHSA-2024:9827" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9827"/>
        <reference ref_id="ALSA-2024:9827" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9827.html"/>
        <description>The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.  

Security Fix(es):  

  * libvpx: Integer overflow in vpx_img_alloc() (CVE-2024-5197)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-18"/>
          <updated date="2024-11-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2291198" id="2291198"></bugzilla>
          <cve public="20240604" href="https://access.redhat.com/security/cve/CVE-2024-5197" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2024-5197</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249827001" comment="libvpx is earlier than 0:1.9.0-8.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235539002" comment="libvpx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249827002" comment="libvpx-devel is earlier than 0:1.9.0-8.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235539004" comment="libvpx-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236732" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:6732: ghostscript security update (Important)</title>
        <reference ref_id="RHSA-2023:6732" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6732"/>
        <reference ref_id="CVE-2023-43115" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43115"/>
        <reference ref_id="ALSA-2023:6732" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6732.html"/>
        <description>The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents (CVE-2023-43115)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241108" id="2241108"></bugzilla>
          <cve public="20230918" href="https://access.redhat.com/security/cve/CVE-2023-43115" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-43115</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732001" comment="ghostscript is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999016" comment="ghostscript is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732016" comment="ghostscript-tools-dvipdf is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999018" comment="ghostscript-tools-dvipdf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732007" comment="ghostscript-tools-fonts is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999019" comment="ghostscript-tools-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732009" comment="ghostscript-tools-printing is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999020" comment="ghostscript-tools-printing is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732017" comment="ghostscript-x11 is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999022" comment="ghostscript-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732013" comment="libgs is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999023" comment="libgs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732015" comment="libgs-devel is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999024" comment="libgs-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236732003" comment="ghostscript-doc is earlier than 0:9.54.0-14.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243999025" comment="ghostscript-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236738" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6738: java-21-openjdk security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2023:6738" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6738"/>
        <reference ref_id="CVE-2023-22025" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22025"/>
        <reference ref_id="CVE-2023-22081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22081"/>
        <reference ref_id="ALSA-2023:6738" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6738.html"/>
        <description>The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.

Security Fix(es):

* OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) (CVE-2023-22025)
* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 21.0.0 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 21.0.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true.
* A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 20.0.0 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 20.0.1, increases it to 16 MB. (AlmaLinux-14954)
* When Transparent Huge Pages (THP) are unconditionally enabled on a system, Java applications using many threads were found to have a large Resident Set Size (RSS). This was due to a race between the kernel transforming thread stack memory into huge pages and the Java Virtual Machine (JVM) shattering these pages into smaller ones when adding a guard page. This release resolves this issue by getting glibc to insert a guard page and prevent the creation of huge pages. (AlmaLinux-14962)
* Installing the same java-21-openjdk-headless package on two different systems resulted in distinct classes.jsa files getting generated. This was because the CDS archive was being generated by a post script action of the java-21-openjdk-headless package. This prevented the use of the dynamic dump feature, because the checksum in the archive would be different on each system. This release resolves this issue by using the .jsa files generated during the initial build. (AlmaLinux-14946)
* The /usr/bin/jfr alternative is now owned by the java-21-openjdk package. (AlmaLinux-14959)
* The jcmd tool is now provided by the java-21-openjdk-headless package, rather than java-21-openjdk-devel, to make it more accessible. (AlmaLinux-14948)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243627" id="2243627"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243805" id="2243805"></bugzilla>
          <cve public="20230926" href="https://access.redhat.com/security/cve/CVE-2023-22025" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22025</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22081" impact="Moderate" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-22081</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738047" comment="java-21-openjdk is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738002" comment="java-21-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738048" comment="java-21-openjdk-demo is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738004" comment="java-21-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738049" comment="java-21-openjdk-demo-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738006" comment="java-21-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738050" comment="java-21-openjdk-demo-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738008" comment="java-21-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738051" comment="java-21-openjdk-devel is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738010" comment="java-21-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738052" comment="java-21-openjdk-devel-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738012" comment="java-21-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738053" comment="java-21-openjdk-devel-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738014" comment="java-21-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738054" comment="java-21-openjdk-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738016" comment="java-21-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738055" comment="java-21-openjdk-headless is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738018" comment="java-21-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738056" comment="java-21-openjdk-headless-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738020" comment="java-21-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738057" comment="java-21-openjdk-headless-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738022" comment="java-21-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738058" comment="java-21-openjdk-javadoc is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738024" comment="java-21-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738059" comment="java-21-openjdk-javadoc-zip is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738026" comment="java-21-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738060" comment="java-21-openjdk-jmods is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738028" comment="java-21-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738061" comment="java-21-openjdk-jmods-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738030" comment="java-21-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738062" comment="java-21-openjdk-jmods-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738032" comment="java-21-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738063" comment="java-21-openjdk-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738034" comment="java-21-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738064" comment="java-21-openjdk-src is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738036" comment="java-21-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738065" comment="java-21-openjdk-src-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738038" comment="java-21-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738066" comment="java-21-openjdk-src-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738040" comment="java-21-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738067" comment="java-21-openjdk-static-libs is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738042" comment="java-21-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738068" comment="java-21-openjdk-static-libs-fastdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738044" comment="java-21-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738069" comment="java-21-openjdk-static-libs-slowdebug is earlier than 1:21.0.1.0.12-2.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738046" comment="java-21-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248726" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8726: firefox security update (Moderate)</title>
        <reference ref_id="CVE-2024-10458" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10458"/>
        <reference ref_id="CVE-2024-10459" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10459"/>
        <reference ref_id="CVE-2024-10460" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10460"/>
        <reference ref_id="CVE-2024-10461" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10461"/>
        <reference ref_id="CVE-2024-10462" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10462"/>
        <reference ref_id="CVE-2024-10463" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10463"/>
        <reference ref_id="CVE-2024-10464" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10464"/>
        <reference ref_id="CVE-2024-10465" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10465"/>
        <reference ref_id="CVE-2024-10466" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10466"/>
        <reference ref_id="CVE-2024-10467" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10467"/>
        <reference ref_id="RHSA-2024:8726" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8726"/>
        <reference ref_id="ALSA-2024:8726" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8726.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.  

Security Fix(es):  

  * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
  * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
  * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
  * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
  * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
  * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
  * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
  * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
  * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
  * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-31"/>
          <updated date="2024-10-31"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2322424" id="2322424"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322425" id="2322425"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322428" id="2322428"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322429" id="2322429"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322433" id="2322433"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322434" id="2322434"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322438" id="2322438"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322439" id="2322439"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322440" id="2322440"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322444" id="2322444"></bugzilla>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10458" impact="Important" cwe="CWE-280" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N">CVE-2024-10458</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10459" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H">CVE-2024-10459</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10460" impact="Moderate" cwe="CWE-940" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-10460</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10461" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-10461</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10462" impact="Moderate" cwe="CWE-280" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-10462</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10463" impact="Moderate" cwe="CWE-942" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-10463</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10464" impact="Low" cwe="CWE-799" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2024-10464</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10465" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-10465</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10466" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2024-10466</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10467" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-10467</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248726001" comment="firefox-x11 is earlier than 0:128.4.0-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248726002" comment="firefox is earlier than 0:128.4.0-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236744" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:6744: samba security update (Moderate)</title>
        <reference ref_id="RHSA-2023:6744" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6744"/>
        <reference ref_id="CVE-2023-3961" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3961"/>
        <reference ref_id="CVE-2023-4091" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4091"/>
        <reference ref_id="CVE-2023-42669" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42669"/>
        <reference ref_id="ALSA-2023:6744" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6744.html"/>
        <description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

Security Fix(es):

* samba: smbd allows client access to unix domain sockets on the file system as root (CVE-2023-3961)
* samba: SMB clients can truncate files with read-only permissions (CVE-2023-4091)
* samba: "rpcecho" development server allows denial of service via sleep() call on AD DC (CVE-2023-42669)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241881" id="2241881"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241882" id="2241882"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241884" id="2241884"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-3961" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L">CVE-2023-3961</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-4091" impact="Moderate" cwe="CWE-276" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N">CVE-2023-4091</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-42669" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-42669</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744068" comment="ctdb is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317002" comment="ctdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744069" comment="libnetapi is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519004" comment="libnetapi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744070" comment="libnetapi-devel is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519006" comment="libnetapi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744071" comment="libsmbclient is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317004" comment="libsmbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744072" comment="libsmbclient-devel is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317006" comment="libsmbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744073" comment="libwbclient is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317008" comment="libwbclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744074" comment="libwbclient-devel is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317010" comment="libwbclient-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744075" comment="python3-samba is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317012" comment="python3-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744076" comment="python3-samba-dc is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519018" comment="python3-samba-dc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744077" comment="python3-samba-devel is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519020" comment="python3-samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744078" comment="python3-samba-test is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519022" comment="python3-samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744079" comment="samba is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317014" comment="samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744080" comment="samba-client is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317016" comment="samba-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744081" comment="samba-client-libs is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317018" comment="samba-client-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744082" comment="samba-common-libs is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317022" comment="samba-common-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744083" comment="samba-common-tools is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317024" comment="samba-common-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744084" comment="samba-dc-libs is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519036" comment="samba-dc-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744085" comment="samba-dcerpc is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519038" comment="samba-dcerpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744086" comment="samba-devel is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317026" comment="samba-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744087" comment="samba-krb5-printing is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317028" comment="samba-krb5-printing is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744088" comment="samba-ldb-ldap-modules is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519044" comment="samba-ldb-ldap-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744089" comment="samba-libs is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317030" comment="samba-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744090" comment="samba-test is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317034" comment="samba-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744091" comment="samba-test-libs is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317036" comment="samba-test-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744092" comment="samba-tools is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519054" comment="samba-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744093" comment="samba-usershares is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232519056" comment="samba-usershares is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744094" comment="samba-vfs-iouring is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317038" comment="samba-vfs-iouring is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744095" comment="samba-winbind is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317040" comment="samba-winbind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744096" comment="samba-winbind-clients is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317042" comment="samba-winbind-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744097" comment="samba-winbind-krb5-locator is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317044" comment="samba-winbind-krb5-locator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744098" comment="samba-winbind-modules is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317046" comment="samba-winbind-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744099" comment="samba-winexe is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317048" comment="samba-winexe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744100" comment="samba-common is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317020" comment="samba-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236744101" comment="samba-pidl is earlier than 0:4.18.6-101.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228317032" comment="samba-pidl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236745" version="638" class="patch">
      <metadata>
        <title>ALSA-2023:6745: curl security update (Important)</title>
        <reference ref_id="RHSA-2023:6745" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6745"/>
        <reference ref_id="CVE-2023-38545" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38545"/>
        <reference ref_id="CVE-2023-38546" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38546"/>
        <reference ref_id="ALSA-2023:6745" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6745.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: a heap-based buffer overflow in the SOCKS5 proxy handshake (CVE-2023-38545)
* curl: cookie injection with none file (CVE-2023-38546)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241933" id="2241933"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241938" id="2241938"></bugzilla>
          <cve public="20231011" href="https://access.redhat.com/security/cve/CVE-2023-38545" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-38545</cve>
          <cve public="20231011" href="https://access.redhat.com/security/cve/CVE-2023-38546" impact="Low" cwe="CWE-73" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2023-38546</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236745001" comment="curl is earlier than 0:7.76.1-26.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236745003" comment="curl-minimal is earlier than 0:7.76.1-26.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236745010" comment="libcurl is earlier than 0:7.76.1-26.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236745011" comment="libcurl-devel is earlier than 0:7.76.1-26.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236745012" comment="libcurl-minimal is earlier than 0:7.76.1-26.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242394" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2394: kernel security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="CVE-2020-26555" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2020-26555.html"/>
        <reference ref_id="CVE-2022-0480" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2022-0480.html"/>
        <reference ref_id="CVE-2022-38096" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2022-38096.html"/>
        <reference ref_id="CVE-2022-45934" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2022-45934.html"/>
        <reference ref_id="CVE-2023-3567" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-3567.html"/>
        <reference ref_id="CVE-2023-4133" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-4133.html"/>
        <reference ref_id="CVE-2023-6040" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6040.html"/>
        <reference ref_id="CVE-2023-6121" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6121.html"/>
        <reference ref_id="CVE-2023-6176" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6176.html"/>
        <reference ref_id="CVE-2023-6531" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6531.html"/>
        <reference ref_id="CVE-2023-6546" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6546.html"/>
        <reference ref_id="CVE-2023-6622" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6622.html"/>
        <reference ref_id="CVE-2023-6915" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6915.html"/>
        <reference ref_id="CVE-2023-6931" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6931.html"/>
        <reference ref_id="CVE-2023-6932" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6932.html"/>
        <reference ref_id="CVE-2023-24023" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-24023.html"/>
        <reference ref_id="CVE-2023-25775" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-25775.html"/>
        <reference ref_id="CVE-2023-28464" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-28464.html"/>
        <reference ref_id="CVE-2023-28866" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-28866.html"/>
        <reference ref_id="CVE-2023-31083" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-31083.html"/>
        <reference ref_id="CVE-2023-37453" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-37453.html"/>
        <reference ref_id="CVE-2023-39189" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-39189.html"/>
        <reference ref_id="CVE-2023-39193" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-39193.html"/>
        <reference ref_id="CVE-2023-39194" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-39194.html"/>
        <reference ref_id="CVE-2023-39198" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-39198.html"/>
        <reference ref_id="CVE-2023-42754" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-42754.html"/>
        <reference ref_id="CVE-2023-42756" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-42756.html"/>
        <reference ref_id="CVE-2023-45863" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-45863.html"/>
        <reference ref_id="CVE-2023-46862" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-46862.html"/>
        <reference ref_id="CVE-2023-51043" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-51043.html"/>
        <reference ref_id="CVE-2023-51779" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-51779.html"/>
        <reference ref_id="CVE-2023-51780" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-51780.html"/>
        <reference ref_id="CVE-2023-52434" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52434.html"/>
        <reference ref_id="CVE-2023-52448" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52448.html"/>
        <reference ref_id="CVE-2023-52450" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52450.html"/>
        <reference ref_id="CVE-2023-52476" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52476.html"/>
        <reference ref_id="CVE-2023-52489" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52489.html"/>
        <reference ref_id="CVE-2023-52522" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52522.html"/>
        <reference ref_id="CVE-2023-52529" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52529.html"/>
        <reference ref_id="CVE-2023-52574" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52574.html"/>
        <reference ref_id="CVE-2023-52578" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52578.html"/>
        <reference ref_id="CVE-2023-52580" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52580.html"/>
        <reference ref_id="CVE-2023-52581" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52581.html"/>
        <reference ref_id="CVE-2023-52597" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52597.html"/>
        <reference ref_id="CVE-2023-52610" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52610.html"/>
        <reference ref_id="CVE-2023-52620" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-52620.html"/>
        <reference ref_id="CVE-2024-0565" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-0565.html"/>
        <reference ref_id="CVE-2024-0841" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-0841.html"/>
        <reference ref_id="CVE-2024-1085" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-1085.html"/>
        <reference ref_id="CVE-2024-1086" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-1086.html"/>
        <reference ref_id="CVE-2024-25744" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-25744.html"/>
        <reference ref_id="CVE-2024-26582" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26582.html"/>
        <reference ref_id="CVE-2024-26583" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26583.html"/>
        <reference ref_id="CVE-2024-26584" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26584.html"/>
        <reference ref_id="CVE-2024-26585" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26585.html"/>
        <reference ref_id="CVE-2024-26586" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26586.html"/>
        <reference ref_id="CVE-2024-26593" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26593.html"/>
        <reference ref_id="CVE-2024-26602" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26602.html"/>
        <reference ref_id="CVE-2024-26609" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26609.html"/>
        <reference ref_id="CVE-2024-26633" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26633.html"/>
        <reference ref_id="CVE-2024-26671" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26671.html"/>
        <reference ref_id="RHSA-2024:2394" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2394"/>
        <reference ref_id="ALSA-2024:2394" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2394.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546)
  * kernel: multiple use-after-free vulnerabilities (CVE-2024-1086, CVE-2023-3567, CVE-2023-4133, CVE-2023-6932, CVE-2023-39198, CVE-2023-51043, CVE-2023-51779, CVE-2023-51780, CVE-2024-1085, CVE-2024-26582)
  * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
  * kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion (CVE-2022-0480)
  * kernel: multiple NULL pointer dereference vulnerabilities (CVE-2022-38096, CVE-2023-6622, CVE-2023-6915, CVE-2023-42754, CVE-2023-46862, CVE-2023-52574, CVE-2024-0841, CVE-2023-52448)
  * kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c (CVE-2022-45934)
  * kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() (CVE-2023-6040)
  * kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF (CVE-2023-6531)
  * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)
  * kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses (CVE-2023-24023)
  * kernel: irdma: Improper access control (CVE-2023-25775)
  * Kernel: double free in hci_conn_cleanup of the bluetooth subsystem (CVE-2023-28464)
  * kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c (CVE-2023-28866)
  * kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl (CVE-2023-31083)
  * kernel: multiple out-of-bounds read vulnerabilities (CVE-2023-37453, CVE-2023-39189, CVE-2023-39193, CVE-2023-6121, CVE-2023-39194)
  * kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP (CVE-2023-42756)
  * kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write (CVE-2023-45863)
  * kernel: smb: client: fix potential OOBs in smb2_parse_contexts() (CVE-2023-52434)
  * kernel: mm/sparsemem: fix race in accessing memory_section-&gt;usage (CVE-2023-52489)
  * kernel: net: fix possible store tearing in neigh_periodic_work() (CVE-2023-52522)
  * kernel: multiple memory leak vulnerabilities (CVE-2023-52529, CVE-2023-52581)
  * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578)
  * kernel: net/core: kernel crash in ETH_P_1588 flow dissector (CVE-2023-52580)
  * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610)
  * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)
  * kernel: tls: race between async notify and socket close (CVE-2024-26583)
  * kernel: tls: handle backlogging of crypto requests (CVE-2024-26584)
  * kernel: tls: race between tx work scheduling and socket close (CVE-2024-26585)
  * kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption (CVE-2024-26586)
  * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)
  * kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier (CVE-2024-26602)
  * kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters (CVE-2024-26609)
  * kernel: local dos vulnerability in scatterwalk_copychunks (CVE-2023-6176)
  * kernel: perf/x86/lbr: Filter vsyscall addresses (CVE-2023-52476)
  * kernel: netfilter: nf_tables: disallow timeout for anonymous sets (CVE-2023-52620)
  * kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (CVE-2024-26633)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.  

Additional Changes:  

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2177759" id="2177759"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1918601" id="1918601"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2049700" id="2049700"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2133452" id="2133452"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2151959" id="2151959"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2185519" id="2185519"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188102" id="2188102"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2210024" id="2210024"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2213132" id="2213132"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2218332" id="2218332"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219359" id="2219359"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221039" id="2221039"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221463" id="2221463"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2221702" id="2221702"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2226777" id="2226777"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2226787" id="2226787"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2226788" id="2226788"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2231410" id="2231410"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2239845" id="2239845"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2239848" id="2239848"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2244720" id="2244720"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2246980" id="2246980"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250043" id="2250043"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2252731" id="2252731"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253034" id="2253034"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253632" id="2253632"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254961" id="2254961"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254982" id="2254982"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255283" id="2255283"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255498" id="2255498"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256490" id="2256490"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256822" id="2256822"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257682" id="2257682"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258013" id="2258013"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258518" id="2258518"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2260005" id="2260005"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2262126" id="2262126"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2262127" id="2262127"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265285" id="2265285"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265517" id="2265517"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265518" id="2265518"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265519" id="2265519"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265520" id="2265520"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265645" id="2265645"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265646" id="2265646"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265653" id="2265653"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267041" id="2267041"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267695" id="2267695"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267750" id="2267750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267758" id="2267758"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267760" id="2267760"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267761" id="2267761"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267788" id="2267788"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2267795" id="2267795"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269189" id="2269189"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269217" id="2269217"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270080" id="2270080"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270118" id="2270118"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270883" id="2270883"></bugzilla>
          <cve public="20210524" href="https://www.redhat.com/security/data/cve/CVE-2020-26555.html" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2020-26555</cve>
          <cve public="20220103" href="https://www.redhat.com/security/data/cve/CVE-2022-0480.html" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-0480</cve>
          <cve public="20220909" href="https://www.redhat.com/security/data/cve/CVE-2022-38096.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2022-38096</cve>
          <cve public="20221121" href="https://www.redhat.com/security/data/cve/CVE-2022-45934.html" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-45934</cve>
          <cve public="20230114" href="https://www.redhat.com/security/data/cve/CVE-2023-3567.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2023-3567</cve>
          <cve public="20230415" href="https://www.redhat.com/security/data/cve/CVE-2023-4133.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-4133</cve>
          <cve public="20240112" href="https://www.redhat.com/security/data/cve/CVE-2023-6040.html" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6040</cve>
          <cve public="20231106" href="https://www.redhat.com/security/data/cve/CVE-2023-6121.html" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2023-6121</cve>
          <cve public="20230912" href="https://www.redhat.com/security/data/cve/CVE-2023-6176.html" impact="Low" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6176</cve>
          <cve public="20231206" href="https://www.redhat.com/security/data/cve/CVE-2023-6531.html" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6531</cve>
          <cve public="20231221" href="https://www.redhat.com/security/data/cve/CVE-2023-6546.html" impact="Important" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6546</cve>
          <cve public="20231208" href="https://www.redhat.com/security/data/cve/CVE-2023-6622.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6622</cve>
          <cve public="20240115" href="https://www.redhat.com/security/data/cve/CVE-2023-6915.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6915</cve>
          <cve public="20231129" href="https://www.redhat.com/security/data/cve/CVE-2023-6931.html" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6931</cve>
          <cve public="20231219" href="https://www.redhat.com/security/data/cve/CVE-2023-6932.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6932</cve>
          <cve public="20231202" href="https://www.redhat.com/security/data/cve/CVE-2023-24023.html" impact="Moderate" cwe="CWE-300" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-24023</cve>
          <cve public="20230811" href="https://www.redhat.com/security/data/cve/CVE-2023-25775.html" impact="Moderate" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-25775</cve>
          <cve public="20230328" href="https://www.redhat.com/security/data/cve/CVE-2023-28464.html" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-28464</cve>
          <cve public="20230327" href="https://www.redhat.com/security/data/cve/CVE-2023-28866.html" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-28866</cve>
          <cve public="20230417" href="https://www.redhat.com/security/data/cve/CVE-2023-31083.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-31083</cve>
          <cve public="20230620" href="https://www.redhat.com/security/data/cve/CVE-2023-37453.html" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-37453</cve>
          <cve public="20230830" href="https://www.redhat.com/security/data/cve/CVE-2023-39189.html" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L">CVE-2023-39189</cve>
          <cve public="20230929" href="https://www.redhat.com/security/data/cve/CVE-2023-39193.html" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L">CVE-2023-39193</cve>
          <cve public="20230929" href="https://www.redhat.com/security/data/cve/CVE-2023-39194.html" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N">CVE-2023-39194</cve>
          <cve public="20230817" href="https://www.redhat.com/security/data/cve/CVE-2023-39198.html" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2023-39198</cve>
          <cve public="20230917" href="https://www.redhat.com/security/data/cve/CVE-2023-42754.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-42754</cve>
          <cve public="20230927" href="https://www.redhat.com/security/data/cve/CVE-2023-42756.html" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-42756</cve>
          <cve public="20230111" href="https://www.redhat.com/security/data/cve/CVE-2023-45863.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2023-45863</cve>
          <cve public="20231029" href="https://www.redhat.com/security/data/cve/CVE-2023-46862.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-46862</cve>
          <cve public="20240123" href="https://www.redhat.com/security/data/cve/CVE-2023-51043.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-51043</cve>
          <cve public="20231225" href="https://www.redhat.com/security/data/cve/CVE-2023-51779.html" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-51779</cve>
          <cve public="20240110" href="https://www.redhat.com/security/data/cve/CVE-2023-51780.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-51780</cve>
          <cve public="20240220" href="https://www.redhat.com/security/data/cve/CVE-2023-52434.html" impact="Moderate" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2023-52434</cve>
          <cve public="20240222" href="https://www.redhat.com/security/data/cve/CVE-2023-52448.html" impact="Low" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52448</cve>
          <cve public="20240222" href="https://www.redhat.com/security/data/cve/CVE-2023-52450.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52450</cve>
          <cve public="20240229" href="https://www.redhat.com/security/data/cve/CVE-2023-52476.html" impact="Low" cwe="CWE-404" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52476</cve>
          <cve public="20240229" href="https://www.redhat.com/security/data/cve/CVE-2023-52489.html" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52489</cve>
          <cve public="20240302" href="https://www.redhat.com/security/data/cve/CVE-2023-52522.html" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52522</cve>
          <cve public="20240302" href="https://www.redhat.com/security/data/cve/CVE-2023-52529.html" impact="Low" cwe="CWE-402" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H">CVE-2023-52529</cve>
          <cve public="20240302" href="https://www.redhat.com/security/data/cve/CVE-2023-52574.html" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52574</cve>
          <cve public="20240302" href="https://www.redhat.com/security/data/cve/CVE-2023-52578.html" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52578</cve>
          <cve public="20240302" href="https://www.redhat.com/security/data/cve/CVE-2023-52580.html" impact="Moderate" cwe="CWE-131" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52580</cve>
          <cve public="20240302" href="https://www.redhat.com/security/data/cve/CVE-2023-52581.html" impact="Moderate" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-52581</cve>
          <cve public="20240306" href="https://www.redhat.com/security/data/cve/CVE-2023-52597.html" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L">CVE-2023-52597</cve>
          <cve public="20240318" href="https://www.redhat.com/security/data/cve/CVE-2023-52610.html" impact="Moderate" cwe="CWE-402" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2023-52610</cve>
          <cve public="20240321" href="https://www.redhat.com/security/data/cve/CVE-2023-52620.html" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2023-52620</cve>
          <cve public="20231218" href="https://www.redhat.com/security/data/cve/CVE-2024-0565.html" impact="Moderate" cwe="CWE-191" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0565</cve>
          <cve public="20240123" href="https://www.redhat.com/security/data/cve/CVE-2024-0841.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-0841</cve>
          <cve public="20240131" href="https://www.redhat.com/security/data/cve/CVE-2024-1085.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-1085</cve>
          <cve public="20240131" href="https://www.redhat.com/security/data/cve/CVE-2024-1086.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-1086</cve>
          <cve public="20240212" href="https://www.redhat.com/security/data/cve/CVE-2024-25744.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H">CVE-2024-25744</cve>
          <cve public="20240221" href="https://www.redhat.com/security/data/cve/CVE-2024-26582.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-26582</cve>
          <cve public="20240221" href="https://www.redhat.com/security/data/cve/CVE-2024-26583.html" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26583</cve>
          <cve public="20240221" href="https://www.redhat.com/security/data/cve/CVE-2024-26584.html" impact="Low" cwe="CWE-393" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26584</cve>
          <cve public="20240221" href="https://www.redhat.com/security/data/cve/CVE-2024-26585.html" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-26585</cve>
          <cve public="20240222" href="https://www.redhat.com/security/data/cve/CVE-2024-26586.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-26586</cve>
          <cve public="20240222" href="https://www.redhat.com/security/data/cve/CVE-2024-26593.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26593</cve>
          <cve public="20240224" href="https://www.redhat.com/security/data/cve/CVE-2024-26602.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26602</cve>
          <cve public="20240229" href="https://www.redhat.com/security/data/cve/CVE-2024-26609.html" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26609</cve>
          <cve public="20240318" href="https://www.redhat.com/security/data/cve/CVE-2024-26633.html" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26633</cve>
          <cve public="20240402" href="https://www.redhat.com/security/data/cve/CVE-2024-26671.html" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26671</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394001" comment="bpftool is earlier than 0:7.3.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394002" comment="kernel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394003" comment="kernel-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394004" comment="kernel-debug is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394005" comment="kernel-debug-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394012" comment="kernel-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394014" comment="kernel-headers is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394015" comment="kernel-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394016" comment="kernel-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394018" comment="kernel-tools is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394021" comment="perf is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394022" comment="python3-perf is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394023" comment="rtla is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394024" comment="rv is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394032" comment="kernel-rt is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394033" comment="kernel-rt-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394044" comment="kernel-64k is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394045" comment="kernel-64k-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394060" comment="libperf is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242394062" comment="kernel-doc is earlier than 0:5.14.0-427.13.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20236746" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:6746: nghttp2 security update (Important)</title>
        <reference ref_id="RHSA-2023:6746" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:6746"/>
        <reference ref_id="CVE-2023-44487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44487"/>
        <reference ref_id="ALSA-2023:6746" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-6746.html"/>
        <description>libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.

Security Fix(es):

* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242803" id="2242803"></bugzilla>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-44487" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-44487</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236746001" comment="libnghttp2 is earlier than 0:1.43.0-5.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838002" comment="libnghttp2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236746003" comment="libnghttp2-devel is earlier than 0:1.43.0-5.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838004" comment="libnghttp2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236746006" comment="nghttp2 is earlier than 0:1.43.0-5.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838006" comment="nghttp2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237253" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:7253: dotnet8.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7253" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7253"/>
        <reference ref_id="CVE-2023-36049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36049"/>
        <reference ref_id="CVE-2023-36558" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36558"/>
        <reference ref_id="ALSA-2023:7253" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7253.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

Security Fix(es):

* dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049)
* dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-15"/>
          <updated date="2023-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2247750" id="2247750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2248883" id="2248883"></bugzilla>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-36049" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36049</cve>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-36558" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36558</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253001" comment="aspnetcore-runtime-8.0 is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253002" comment="aspnetcore-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253003" comment="aspnetcore-targeting-pack-8.0 is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253004" comment="aspnetcore-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253005" comment="dotnet-apphost-pack-8.0 is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253006" comment="dotnet-apphost-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253007" comment="dotnet-host is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253009" comment="dotnet-hostfxr-8.0 is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253010" comment="dotnet-hostfxr-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253011" comment="dotnet-runtime-8.0 is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253012" comment="dotnet-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253013" comment="dotnet-sdk-8.0 is earlier than 0:8.0.100-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253014" comment="dotnet-sdk-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253015" comment="dotnet-sdk-8.0-source-built-artifacts is earlier than 0:8.0.100-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253016" comment="dotnet-sdk-8.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253017" comment="dotnet-targeting-pack-8.0 is earlier than 0:8.0.0-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253018" comment="dotnet-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253019" comment="dotnet-templates-8.0 is earlier than 0:8.0.100-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253020" comment="dotnet-templates-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253021" comment="netstandard-targeting-pack-2.1 is earlier than 0:8.0.100-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237255" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:7255: dotnet7.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7255" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7255"/>
        <reference ref_id="CVE-2023-36049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36049"/>
        <reference ref_id="CVE-2023-36558" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36558"/>
        <reference ref_id="ALSA-2023:7255" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7255.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.114 and .NET Runtime 7.0.14.
  

Security Fix(es):

* dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049)
* dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-15"/>
          <updated date="2023-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2247750" id="2247750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2248883" id="2248883"></bugzilla>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-36049" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36049</cve>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-36558" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36558</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255007" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255009" comment="dotnet-runtime-7.0 is earlier than 0:7.0.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255011" comment="dotnet-sdk-7.0 is earlier than 0:7.0.114-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255013" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.114-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255015" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237255017" comment="dotnet-templates-7.0 is earlier than 0:7.0.114-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237257" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:7257: dotnet6.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7257" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7257"/>
        <reference ref_id="CVE-2023-36049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36049"/>
        <reference ref_id="CVE-2023-36558" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36558"/>
        <reference ref_id="ALSA-2023:7257" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7257.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.125 and .NET Runtime 6.0.25.

Security Fix(es):

* dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049)
* dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-15"/>
          <updated date="2023-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2247750" id="2247750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2248883" id="2248883"></bugzilla>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-36049" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36049</cve>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-36558" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-36558</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.25-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.25-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.25-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.25-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.25-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.125-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.125-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.25-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237257017" comment="dotnet-templates-6.0 is earlier than 0:6.0.125-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244583" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4583: kernel security update (Important)</title>
        <reference ref_id="CVE-2021-47548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47548"/>
        <reference ref_id="CVE-2021-47596" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47596"/>
        <reference ref_id="CVE-2022-48627" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48627"/>
        <reference ref_id="CVE-2023-52638" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52638"/>
        <reference ref_id="CVE-2024-26783" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26783"/>
        <reference ref_id="CVE-2024-26858" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26858"/>
        <reference ref_id="CVE-2024-27397" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27397"/>
        <reference ref_id="CVE-2024-27435" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27435"/>
        <reference ref_id="CVE-2024-35958" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35958"/>
        <reference ref_id="CVE-2024-36270" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36270"/>
        <reference ref_id="CVE-2024-36886" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36886"/>
        <reference ref_id="CVE-2024-36904" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36904"/>
        <reference ref_id="CVE-2024-36957" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36957"/>
        <reference ref_id="CVE-2024-38543" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38543"/>
        <reference ref_id="CVE-2024-38586" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38586"/>
        <reference ref_id="CVE-2024-38593" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38593"/>
        <reference ref_id="CVE-2024-38663" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38663"/>
        <reference ref_id="RHSA-2024:4583" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4583"/>
        <reference ref_id="ALSA-2024:4583" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4583.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
  * kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)
  * kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596)
  * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)
  * kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638)
  * kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)
  * kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858)
  * kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
  * kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435)
  * kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)
  * kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)
  * kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543)
  * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
  * kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593)
  * kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)
  * kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957)
  * kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-17"/>
          <updated date="2024-07-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2267509" id="2267509"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273082" id="2273082"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273466" id="2273466"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275735" id="2275735"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277238" id="2277238"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280434" id="2280434"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281131" id="2281131"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281925" id="2281925"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2283401" id="2283401"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284541" id="2284541"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284581" id="2284581"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293230" id="2293230"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293380" id="2293380"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293402" id="2293402"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293456" id="2293456"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293653" id="2293653"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2294225" id="2294225"></bugzilla>
          <cve public="20240524" href="https://access.redhat.com/security/cve/CVE-2021-47548" impact="Moderate" cwe="CWE-129" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H">CVE-2021-47548</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2021-47596" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2021-47596</cve>
          <cve public="20240302" href="https://access.redhat.com/security/cve/CVE-2022-48627" impact="Moderate" cwe="CWE-1260" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2022-48627</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2023-52638" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52638</cve>
          <cve public="20240404" href="https://access.redhat.com/security/cve/CVE-2024-26783" impact="Moderate" cwe="CWE-762" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26783</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26858" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26858</cve>
          <cve public="20240508" href="https://access.redhat.com/security/cve/CVE-2024-27397" impact="Important" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-27397</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-27435" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27435</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-35958" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35958</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-36270" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36270</cve>
          <cve public="20240606" href="https://access.redhat.com/security/cve/CVE-2024-36886" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36886</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36904" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36904</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36957" impact="Low" cwe="CWE-193" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2024-36957</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38543" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38543</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38586" impact="Moderate" cwe="CWE-457" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38586</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38593" impact="Moderate" cwe="CWE-457" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38593</cve>
          <cve public="20240624" href="https://access.redhat.com/security/cve/CVE-2024-38663" impact="Low" cwe="CWE-665" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38663</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583001" comment="bpftool is earlier than 0:7.3.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583002" comment="kernel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583003" comment="kernel-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583004" comment="kernel-debug is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583005" comment="kernel-debug-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583012" comment="kernel-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583014" comment="kernel-headers is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583015" comment="kernel-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583016" comment="kernel-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583018" comment="kernel-tools is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583021" comment="perf is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583022" comment="python3-perf is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583023" comment="rtla is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583024" comment="rv is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583032" comment="kernel-rt is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583033" comment="kernel-rt-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583044" comment="kernel-64k is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583045" comment="kernel-64k-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583060" comment="libperf is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244583062" comment="kernel-doc is earlier than 0:5.14.0-427.26.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237277" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:7277: open-vm-tools security update (Important)</title>
        <reference ref_id="RHSA-2023:7277" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7277"/>
        <reference ref_id="CVE-2023-34058" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34058"/>
        <reference ref_id="CVE-2023-34059" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-34059"/>
        <reference ref_id="ALSA-2023:7277" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7277.html"/>
        <description>The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.

Security Fix(es):

* open-vm-tools: SAML token signature bypass (CVE-2023-34058)
* open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper (CVE-2023-34059)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-15"/>
          <updated date="2023-11-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2246080" id="2246080"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2246096" id="2246096"></bugzilla>
          <cve public="20231026" href="https://access.redhat.com/security/cve/CVE-2023-34058" impact="Important" cwe="CWE-1220" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-34058</cve>
          <cve public="20231026" href="https://access.redhat.com/security/cve/CVE-2023-34059" impact="Important" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-34059</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237277010" comment="open-vm-tools is earlier than 0:12.2.5-3.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358002" comment="open-vm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237277011" comment="open-vm-tools-desktop is earlier than 0:12.2.5-3.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358004" comment="open-vm-tools-desktop is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237277012" comment="open-vm-tools-salt-minion is earlier than 0:12.2.5-3.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20233948006" comment="open-vm-tools-salt-minion is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237277013" comment="open-vm-tools-sdmp is earlier than 0:12.2.5-3.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358006" comment="open-vm-tools-sdmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237277014" comment="open-vm-tools-test is earlier than 0:12.2.5-3.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226358008" comment="open-vm-tools-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237507" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:7507: firefox security update (Important)</title>
        <reference ref_id="RHSA-2023:7507" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7507"/>
        <reference ref_id="CVE-2023-6204" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6204"/>
        <reference ref_id="CVE-2023-6205" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6205"/>
        <reference ref_id="CVE-2023-6206" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6206"/>
        <reference ref_id="CVE-2023-6207" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6207"/>
        <reference ref_id="CVE-2023-6208" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6208"/>
        <reference ref_id="CVE-2023-6209" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6209"/>
        <reference ref_id="CVE-2023-6212" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6212"/>
        <reference ref_id="ALSA-2023:7507" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7507.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.5.0 ESR.

Security Fix(es):

* Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204)
* Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205)
* Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206)
* Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207)
* Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212)
* Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208)
* Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-11-27"/>
          <updated date="2023-11-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2250896" id="2250896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250897" id="2250897"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250898" id="2250898"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250899" id="2250899"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250900" id="2250900"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250901" id="2250901"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2250902" id="2250902"></bugzilla>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6204" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6204</cve>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6205" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6205</cve>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6206" impact="Important" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6206</cve>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6207" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6207</cve>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6208" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6208</cve>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6209" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6209</cve>
          <cve public="20231121" href="https://access.redhat.com/security/cve/CVE-2023-6212" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6212</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237507004" comment="firefox is earlier than 0:115.5.0-1.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237507005" comment="firefox-x11 is earlier than 0:115.5.0-1.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237711" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:7711: apr security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7711" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7711"/>
        <reference ref_id="CVE-2022-24963" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-24963"/>
        <reference ref_id="ALSA-2023:7711" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7711.html"/>
        <description>The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.

Security Fix(es):

* apr: integer overflow/wraparound in apr_encode (CVE-2022-24963)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-11"/>
          <updated date="2023-12-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2169465" id="2169465"></bugzilla>
          <cve public="20230131" href="https://access.redhat.com/security/cve/CVE-2022-24963" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L">CVE-2022-24963</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237711001" comment="apr is earlier than 0:1.7.0-12.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237711002" comment="apr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237711003" comment="apr-devel is earlier than 0:1.7.0-12.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237711004" comment="apr-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237715" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:7715: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2023:7715" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7715"/>
        <reference ref_id="CVE-2023-42917" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42917"/>
        <reference ref_id="ALSA-2023:7715" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7715.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-11"/>
          <updated date="2023-12-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2253058" id="2253058"></bugzilla>
          <cve public="20231205" href="https://access.redhat.com/security/cve/CVE-2023-42917" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-42917</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237715001" comment="webkit2gtk3 is earlier than 0:2.40.5-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237715003" comment="webkit2gtk3-devel is earlier than 0:2.40.5-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237715005" comment="webkit2gtk3-jsc is earlier than 0:2.40.5-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237715007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.40.5-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237747" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:7747: libxml2 security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7747" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7747"/>
        <reference ref_id="CVE-2023-39615" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39615"/>
        <reference ref_id="ALSA-2023:7747" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7747.html"/>
        <description>The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

* libxml2: crafted xml can cause global buffer overflow (CVE-2023-39615)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-12"/>
          <updated date="2023-12-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235864" id="2235864"></bugzilla>
          <cve public="20230829" href="https://access.redhat.com/security/cve/CVE-2023-39615" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-39615</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237747001" comment="libxml2 is earlier than 0:2.9.13-5.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250002" comment="libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237747003" comment="libxml2-devel is earlier than 0:2.9.13-5.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250004" comment="libxml2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237747006" comment="python3-libxml2 is earlier than 0:2.9.13-5.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250006" comment="python3-libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237753" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:7753: fence-agents security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7753" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7753"/>
        <reference ref_id="CVE-2023-37920" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37920"/>
        <reference ref_id="CVE-2023-43804" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43804"/>
        <reference ref_id="ALSA-2023:7753" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7753.html"/>
        <description>The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. 

Security Fix(es):

* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)
* python-urllib3: Cookie request header isn't stripped during cross-origin redirects (CVE-2023-43804)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-12"/>
          <updated date="2023-12-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2226586" id="2226586"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2242493" id="2242493"></bugzilla>
          <cve public="20230725" href="https://access.redhat.com/security/cve/CVE-2023-37920" impact="Low" cwe="CWE-345" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-37920</cve>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43804" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N">CVE-2023-43804</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753110" comment="fence-agents-aliyun is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161002" comment="fence-agents-aliyun is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753111" comment="fence-agents-all is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161004" comment="fence-agents-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753112" comment="fence-agents-aws is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161012" comment="fence-agents-aws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753113" comment="fence-agents-azure-arm is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161014" comment="fence-agents-azure-arm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753114" comment="fence-agents-compute is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161026" comment="fence-agents-compute is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753115" comment="fence-agents-gce is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161036" comment="fence-agents-gce is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753116" comment="fence-agents-kdump is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161064" comment="fence-agents-kdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753117" comment="fence-agents-kubevirt is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161066" comment="fence-agents-kubevirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753118" comment="fence-agents-openstack is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161072" comment="fence-agents-openstack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753119" comment="fence-agents-redfish is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161074" comment="fence-agents-redfish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753120" comment="fence-agents-zvm is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161094" comment="fence-agents-zvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753121" comment="fence-virt is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161096" comment="fence-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753122" comment="fence-virtd is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161098" comment="fence-virtd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753123" comment="fence-virtd-cpg is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161100" comment="fence-virtd-cpg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753124" comment="fence-virtd-libvirt is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161102" comment="fence-virtd-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753125" comment="fence-virtd-multicast is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161104" comment="fence-virtd-multicast is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753126" comment="fence-virtd-serial is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161106" comment="fence-virtd-serial is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753127" comment="fence-virtd-tcp is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161108" comment="fence-virtd-tcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753128" comment="ha-cloud-support is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161110" comment="ha-cloud-support is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753129" comment="fence-agents-amt-ws is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161006" comment="fence-agents-amt-ws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753130" comment="fence-agents-apc is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161008" comment="fence-agents-apc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753131" comment="fence-agents-apc-snmp is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161010" comment="fence-agents-apc-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753132" comment="fence-agents-bladecenter is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161016" comment="fence-agents-bladecenter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753133" comment="fence-agents-brocade is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161018" comment="fence-agents-brocade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753134" comment="fence-agents-cisco-mds is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161020" comment="fence-agents-cisco-mds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753135" comment="fence-agents-cisco-ucs is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161022" comment="fence-agents-cisco-ucs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753136" comment="fence-agents-common is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161024" comment="fence-agents-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753137" comment="fence-agents-drac5 is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161028" comment="fence-agents-drac5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753138" comment="fence-agents-eaton-snmp is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161030" comment="fence-agents-eaton-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753139" comment="fence-agents-emerson is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161032" comment="fence-agents-emerson is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753140" comment="fence-agents-eps is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161034" comment="fence-agents-eps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753141" comment="fence-agents-heuristics-ping is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161038" comment="fence-agents-heuristics-ping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753142" comment="fence-agents-hpblade is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161040" comment="fence-agents-hpblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753143" comment="fence-agents-ibm-powervs is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161042" comment="fence-agents-ibm-powervs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753144" comment="fence-agents-ibm-vpc is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161044" comment="fence-agents-ibm-vpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753145" comment="fence-agents-ibmblade is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161046" comment="fence-agents-ibmblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753146" comment="fence-agents-ifmib is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161048" comment="fence-agents-ifmib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753147" comment="fence-agents-ilo-moonshot is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161050" comment="fence-agents-ilo-moonshot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753148" comment="fence-agents-ilo-mp is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161052" comment="fence-agents-ilo-mp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753149" comment="fence-agents-ilo-ssh is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161054" comment="fence-agents-ilo-ssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753150" comment="fence-agents-ilo2 is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161056" comment="fence-agents-ilo2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753151" comment="fence-agents-intelmodular is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161058" comment="fence-agents-intelmodular is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753152" comment="fence-agents-ipdu is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161060" comment="fence-agents-ipdu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753153" comment="fence-agents-ipmilan is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161062" comment="fence-agents-ipmilan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753154" comment="fence-agents-lpar is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161068" comment="fence-agents-lpar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753155" comment="fence-agents-mpath is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161070" comment="fence-agents-mpath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753156" comment="fence-agents-rhevm is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161076" comment="fence-agents-rhevm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753157" comment="fence-agents-rsa is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161078" comment="fence-agents-rsa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753158" comment="fence-agents-rsb is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161080" comment="fence-agents-rsb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753159" comment="fence-agents-sbd is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161082" comment="fence-agents-sbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753160" comment="fence-agents-scsi is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161084" comment="fence-agents-scsi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753161" comment="fence-agents-virsh is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161086" comment="fence-agents-virsh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753162" comment="fence-agents-vmware-rest is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161088" comment="fence-agents-vmware-rest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753163" comment="fence-agents-vmware-soap is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161090" comment="fence-agents-vmware-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237753164" comment="fence-agents-wti is earlier than 0:4.10.0-55.el9_3.2.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161092" comment="fence-agents-wti is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237763" version="636" class="patch">
      <metadata>
        <title>ALSA-2023:7763: runc security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7763" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7763"/>
        <reference ref_id="CVE-2023-29409" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29409"/>
        <reference ref_id="CVE-2023-39321" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39321"/>
        <reference ref_id="CVE-2023-39322" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39322"/>
        <reference ref_id="ALSA-2023:7763" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7763.html"/>
        <description>The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)
* golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)
* golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-12"/>
          <updated date="2023-12-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228743" id="2228743"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237777" id="2237777"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237778" id="2237778"></bugzilla>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-29409" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-29409</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39321" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39321</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39322" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39322</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20237763001" comment="runc is earlier than 4:1.1.9-2.el9_3"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244762002" comment="runc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237765" version="637" class="patch">
      <metadata>
        <title>ALSA-2023:7765: podman security update (Moderate)</title>
        <reference ref_id="RHSA-2023:7765" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7765"/>
        <reference ref_id="CVE-2023-29409" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29409"/>
        <reference ref_id="CVE-2023-39318" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39318"/>
        <reference ref_id="CVE-2023-39319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39319"/>
        <reference ref_id="CVE-2023-39321" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39321"/>
        <reference ref_id="CVE-2023-39322" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39322"/>
        <reference ref_id="ALSA-2023:7765" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7765.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)
* golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)
* golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)
* golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)
* golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-12"/>
          <updated date="2023-12-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228743" id="2228743"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237773" id="2237773"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237776" id="2237776"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237777" id="2237777"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237778" id="2237778"></bugzilla>
          <cve public="20230802" href="https://access.redhat.com/security/cve/CVE-2023-29409" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-29409</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39318" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-39318</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39319" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-39319</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39321" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39321</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39322" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39322</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237765001" comment="podman is earlier than 2:4.6.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237765005" comment="podman-gvproxy is earlier than 2:4.6.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954006" comment="podman-gvproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237765007" comment="podman-plugins is earlier than 2:4.6.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237765009" comment="podman-remote is earlier than 2:4.6.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237765011" comment="podman-tests is earlier than 2:4.6.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237765003" comment="podman-docker is earlier than 2:4.6.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20237784" version="635" class="patch">
      <metadata>
        <title>ALSA-2023:7784: postgresql security update (Important)</title>
        <reference ref_id="RHSA-2023:7784" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2023:7784"/>
        <reference ref_id="CVE-2023-39417" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39417"/>
        <reference ref_id="CVE-2023-5868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5868"/>
        <reference ref_id="CVE-2023-5869" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5869"/>
        <reference ref_id="CVE-2023-5870" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5870"/>
        <reference ref_id="ALSA-2023:7784" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2023-7784.html"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

* postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869)
* postgresql: Memory disclosure in aggregate function calls (CVE-2023-5868)
* postgresql: extension script @substitutions@ within quoting allow SQL injection (CVE-2023-39417)
* postgresql: Role pg_signal_backend can signal certain superuser processes. (CVE-2023-5870)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2023 AlmaLinux OS</rights>
          <issued date="2023-12-13"/>
          <updated date="2023-12-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2228111" id="2228111"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2247168" id="2247168"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2247169" id="2247169"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2247170" id="2247170"></bugzilla>
          <cve public="20230810" href="https://access.redhat.com/security/cve/CVE-2023-39417" impact="Moderate" cwe="CWE-89" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-39417</cve>
          <cve public="20231109" href="https://access.redhat.com/security/cve/CVE-2023-5868" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2023-5868</cve>
          <cve public="20231109" href="https://access.redhat.com/security/cve/CVE-2023-5869" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5869</cve>
          <cve public="20231109" href="https://access.redhat.com/security/cve/CVE-2023-5870" impact="Low" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L">CVE-2023-5870</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784001" comment="postgresql is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771002" comment="postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784003" comment="postgresql-contrib is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771004" comment="postgresql-contrib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784005" comment="postgresql-docs is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693006" comment="postgresql-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784007" comment="postgresql-plperl is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771006" comment="postgresql-plperl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784009" comment="postgresql-plpython3 is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771008" comment="postgresql-plpython3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784011" comment="postgresql-pltcl is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771010" comment="postgresql-pltcl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784013" comment="postgresql-private-devel is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771012" comment="postgresql-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784015" comment="postgresql-private-libs is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771014" comment="postgresql-private-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784017" comment="postgresql-server is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771016" comment="postgresql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784019" comment="postgresql-server-devel is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771018" comment="postgresql-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784021" comment="postgresql-static is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693022" comment="postgresql-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784023" comment="postgresql-test is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771020" comment="postgresql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784025" comment="postgresql-upgrade is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771022" comment="postgresql-upgrade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237784027" comment="postgresql-upgrade-devel is earlier than 0:13.13-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693028" comment="postgresql-upgrade-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240001" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0001: thunderbird security update (Important)</title>
        <reference ref_id="RHSA-2024:0001" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0001"/>
        <reference ref_id="CVE-2023-50761" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50761"/>
        <reference ref_id="CVE-2023-50762" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50762"/>
        <reference ref_id="CVE-2023-6856" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6856"/>
        <reference ref_id="CVE-2023-6857" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6857"/>
        <reference ref_id="CVE-2023-6858" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6858"/>
        <reference ref_id="CVE-2023-6859" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6859"/>
        <reference ref_id="CVE-2023-6860" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6860"/>
        <reference ref_id="CVE-2023-6861" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6861"/>
        <reference ref_id="CVE-2023-6862" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6862"/>
        <reference ref_id="CVE-2023-6863" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6863"/>
        <reference ref_id="CVE-2023-6864" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6864"/>
        <reference ref_id="ALSA-2024:0001" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0001.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.6.0.

Security Fix(es):

* Mozilla: Heap-buffer-overflow affecting WebGL &lt;code&gt;DrawElementsInstanced&lt;/code&gt; method with Mesa VM driver (CVE-2023-6856)
* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)
* Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761)
* Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762)
* Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)
* Mozilla: Heap buffer overflow in &lt;code&gt;nsTextFragment&lt;/code&gt; (CVE-2023-6858)
* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)
* Mozilla: Potential sandbox escape due to &lt;code&gt;VideoBridge&lt;/code&gt; lack of texture validation (CVE-2023-6860)
* Mozilla: Heap buffer overflow affected &lt;code&gt;nsWindow::PickerOpen(void)&lt;/code&gt; in headless mode (CVE-2023-6861)
* Mozilla: Use-after-free in &lt;code&gt;nsDNSService&lt;/code&gt; (CVE-2023-6862)
* Mozilla: Undefined behavior in &lt;code&gt;ShutdownObserver()&lt;/code&gt; (CVE-2023-6863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-02"/>
          <updated date="2024-01-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255362" id="2255362"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255360" id="2255360"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255363" id="2255363"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255364" id="2255364"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255365" id="2255365"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255367" id="2255367"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255368" id="2255368"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255369" id="2255369"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255370" id="2255370"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255378" id="2255378"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255379" id="2255379"></bugzilla>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-50761" impact="Important" cwe="CWE-347" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-50761</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-50762" impact="Important" cwe="CWE-347" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-50762</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6856" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6856</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6857" impact="Moderate" cwe="CWE-363" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6857</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6858" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6858</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6859" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6859</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6860" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6860</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6861" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6861</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6862" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6862</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6863" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6863</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6864" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6864</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20240001002" comment="thunderbird is earlier than 0:115.6.0-1.el9_3.alma"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240010" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0010: tigervnc security update (Important)</title>
        <reference ref_id="RHSA-2024:0010" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0010"/>
        <reference ref_id="CVE-2023-5367" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5367"/>
        <reference ref_id="CVE-2023-6377" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6377"/>
        <reference ref_id="CVE-2023-6478" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6478"/>
        <reference ref_id="ALSA-2024:0010" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0010.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-02"/>
          <updated date="2024-01-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243091" id="2243091"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253291" id="2253291"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253298" id="2253298"></bugzilla>
          <cve public="20231025" href="https://access.redhat.com/security/cve/CVE-2023-5367" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5367</cve>
          <cve public="20231213" href="https://access.redhat.com/security/cve/CVE-2023-6377" impact="Important" cwe="CWE-787-&gt;CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6377</cve>
          <cve public="20231213" href="https://access.redhat.com/security/cve/CVE-2023-6478" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L">CVE-2023-6478</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010014" comment="tigervnc is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010015" comment="tigervnc-server is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010016" comment="tigervnc-server-minimal is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010017" comment="tigervnc-server-module is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010018" comment="tigervnc-icons is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010019" comment="tigervnc-license is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240010020" comment="tigervnc-selinux is earlier than 0:1.13.1-3.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240025" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0025: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:0025" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0025"/>
        <reference ref_id="CVE-2023-6856" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6856"/>
        <reference ref_id="CVE-2023-6857" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6857"/>
        <reference ref_id="CVE-2023-6858" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6858"/>
        <reference ref_id="CVE-2023-6859" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6859"/>
        <reference ref_id="CVE-2023-6860" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6860"/>
        <reference ref_id="CVE-2023-6861" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6861"/>
        <reference ref_id="CVE-2023-6862" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6862"/>
        <reference ref_id="CVE-2023-6863" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6863"/>
        <reference ref_id="CVE-2023-6864" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6864"/>
        <reference ref_id="CVE-2023-6865" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6865"/>
        <reference ref_id="CVE-2023-6867" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6867"/>
        <reference ref_id="ALSA-2024:0025" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0025.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.6.0 ESR.

Security Fix(es):

* Mozilla: Heap-buffer-overflow affecting WebGL &lt;code&gt;DrawElementsInstanced&lt;/code&gt; method with Mesa VM driver (CVE-2023-6856)
* Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864)
* Mozilla: Potential exposure of uninitialized data in &lt;code&gt;EncryptingOutputStream&lt;/code&gt; (CVE-2023-6865)
* Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857)
* Mozilla: Heap buffer overflow in &lt;code&gt;nsTextFragment&lt;/code&gt; (CVE-2023-6858)
* Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859)
* Mozilla: Potential sandbox escape due to &lt;code&gt;VideoBridge&lt;/code&gt; lack of texture validation (CVE-2023-6860)
* Mozilla: Heap buffer overflow affected &lt;code&gt;nsWindow::PickerOpen(void)&lt;/code&gt; in headless mode (CVE-2023-6861)
* Mozilla: Use-after-free in &lt;code&gt;nsDNSService&lt;/code&gt; (CVE-2023-6862)
* Mozilla: Clickjacking permission prompts using the popup transition (CVE-2023-6867)
* Mozilla: Undefined behavior in &lt;code&gt;ShutdownObserver()&lt;/code&gt; (CVE-2023-6863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-02"/>
          <updated date="2024-01-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255360" id="2255360"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255361" id="2255361"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255362" id="2255362"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255363" id="2255363"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255364" id="2255364"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255365" id="2255365"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255366" id="2255366"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255367" id="2255367"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255368" id="2255368"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255369" id="2255369"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255370" id="2255370"></bugzilla>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6856" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6856</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6857" impact="Moderate" cwe="CWE-363" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6857</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6858" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6858</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6859" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6859</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6860" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6860</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6861" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6861</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6862" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6862</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6863" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6863</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6864" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6864</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6865" impact="Important" cwe="CWE-908" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-6865</cve>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6867" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-6867</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240025004" comment="firefox is earlier than 0:115.6.0-1.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240025005" comment="firefox-x11 is earlier than 0:115.6.0-1.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240108" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0108: nss security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0108" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0108"/>
        <reference ref_id="CVE-2023-5388" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5388"/>
        <reference ref_id="ALSA-2024:0108" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0108.html"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Security Fix(es):

* nss: timing attack against RSA decryption (CVE-2023-5388)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-10"/>
          <updated date="2024-01-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243644" id="2243644"></bugzilla>
          <cve public="20231012" href="https://access.redhat.com/security/cve/CVE-2023-5388" impact="Moderate" cwe="CWE-208" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-5388</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108001" comment="nspr is earlier than 0:4.35.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368002" comment="nspr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108003" comment="nspr-devel is earlier than 0:4.35.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368004" comment="nspr-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108005" comment="nss is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368006" comment="nss is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108007" comment="nss-devel is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368008" comment="nss-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108009" comment="nss-softokn is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368010" comment="nss-softokn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108011" comment="nss-softokn-devel is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368012" comment="nss-softokn-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108013" comment="nss-softokn-freebl is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368014" comment="nss-softokn-freebl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108015" comment="nss-softokn-freebl-devel is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368016" comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108024" comment="nss-sysinit is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368018" comment="nss-sysinit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108025" comment="nss-tools is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368020" comment="nss-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108021" comment="nss-util is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368022" comment="nss-util is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240108023" comment="nss-util-devel is earlier than 0:3.90.0-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368024" comment="nss-util-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240141" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0141: ipa security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0141" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0141"/>
        <reference ref_id="CVE-2023-5455" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5455"/>
        <reference ref_id="ALSA-2024:0141" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0141.html"/>
        <description>AlmaLinux Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

Security Fix(es):

* ipa: Invalid CSRF protection (CVE-2023-5455)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-10"/>
          <updated date="2024-01-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242828" id="2242828"></bugzilla>
          <cve public="20240110" href="https://access.redhat.com/security/cve/CVE-2023-5455" impact="Moderate" cwe="CWE-352" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2023-5455</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141029" comment="ipa-client is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141002" comment="ipa-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141030" comment="ipa-client-epn is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141006" comment="ipa-client-epn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141031" comment="ipa-client-samba is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141008" comment="ipa-client-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141032" comment="ipa-server is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141014" comment="ipa-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141033" comment="ipa-server-trust-ad is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141020" comment="ipa-server-trust-ad is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141034" comment="ipa-client-common is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141004" comment="ipa-client-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141035" comment="ipa-common is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141010" comment="ipa-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141036" comment="ipa-selinux is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141012" comment="ipa-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141037" comment="ipa-server-common is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141016" comment="ipa-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141038" comment="ipa-server-dns is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141018" comment="ipa-server-dns is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141039" comment="python3-ipaclient is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141022" comment="python3-ipaclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141040" comment="python3-ipalib is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141024" comment="python3-ipalib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141041" comment="python3-ipaserver is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141026" comment="python3-ipaserver is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141042" comment="python3-ipatests is earlier than 0:4.10.2-5.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141028" comment="python3-ipatests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240151" version="642" class="patch">
      <metadata>
        <title>ALSA-2024:0151: .NET 7.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:0151" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0151"/>
        <reference ref_id="CVE-2024-0056" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0056"/>
        <reference ref_id="CVE-2024-0057" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0057"/>
        <reference ref_id="CVE-2024-21319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21319"/>
        <reference ref_id="ALSA-2024:0151" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0151.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.115 and .NET Runtime 7.0.15.

Security Fix(es):

* dotnet: Information Disclosure: MD.SqlClient(MDS) &amp; System.data.SQLClient (SDS) (CVE-2024-0056)
* dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057)
* dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-10"/>
          <updated date="2024-01-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255384" id="2255384"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255386" id="2255386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257566" id="2257566"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2024-0056" impact="Important" cwe="CWE-420" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-0056</cve>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2024-0057" impact="Important" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-0057</cve>
          <cve public="20240110" href="https://access.redhat.com/security/cve/CVE-2024-21319" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2024-21319</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.15-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.15-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.15-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151007" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.15-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151009" comment="dotnet-runtime-7.0 is earlier than 0:7.0.15-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151011" comment="dotnet-sdk-7.0 is earlier than 0:7.0.115-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151013" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.115-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151015" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.15-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240151017" comment="dotnet-templates-7.0 is earlier than 0:7.0.115-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240152" version="640" class="patch">
      <metadata>
        <title>ALSA-2024:0152: .NET 8.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:0152" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0152"/>
        <reference ref_id="CVE-2024-0056" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0056"/>
        <reference ref_id="CVE-2024-0057" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0057"/>
        <reference ref_id="CVE-2024-21319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21319"/>
        <reference ref_id="ALSA-2024:0152" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0152.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.101 and .NET Runtime 8.0.1.

Security Fix(es):

* dotnet: Information Disclosure: MD.SqlClient(MDS) &amp; System.data.SQLClient (SDS) (CVE-2024-0056)
* dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057)
* dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-10"/>
          <updated date="2024-01-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255384" id="2255384"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255386" id="2255386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257566" id="2257566"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2024-0056" impact="Important" cwe="CWE-420" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-0056</cve>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2024-0057" impact="Important" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-0057</cve>
          <cve public="20240110" href="https://access.redhat.com/security/cve/CVE-2024-21319" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2024-21319</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152001" comment="aspnetcore-runtime-8.0 is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253002" comment="aspnetcore-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152003" comment="aspnetcore-targeting-pack-8.0 is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253004" comment="aspnetcore-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152005" comment="dotnet-apphost-pack-8.0 is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253006" comment="dotnet-apphost-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152007" comment="dotnet-host is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152009" comment="dotnet-hostfxr-8.0 is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253010" comment="dotnet-hostfxr-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152011" comment="dotnet-runtime-8.0 is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253012" comment="dotnet-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152013" comment="dotnet-sdk-8.0 is earlier than 0:8.0.101-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253014" comment="dotnet-sdk-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152015" comment="dotnet-sdk-8.0-source-built-artifacts is earlier than 0:8.0.101-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253016" comment="dotnet-sdk-8.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152017" comment="dotnet-targeting-pack-8.0 is earlier than 0:8.0.1-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253018" comment="dotnet-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152019" comment="dotnet-templates-8.0 is earlier than 0:8.0.101-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253020" comment="dotnet-templates-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240152021" comment="netstandard-targeting-pack-2.1 is earlier than 0:8.0.101-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202410472" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:10472: webkit2gtk3 security update (Important)</title>
        <reference ref_id="CVE-2024-44309" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-44309"/>
        <reference ref_id="RHSA-2024:10472" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:10472"/>
        <reference ref_id="ALSA-2024:10472" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-10472.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.  

Security Fix(es):  

  * webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-27"/>
          <updated date="2024-11-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2327927" id="2327927"></bugzilla>
          <cve public="20241120" href="https://access.redhat.com/security/cve/CVE-2024-44309" impact="Important" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-44309</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410472001" comment="webkit2gtk3 is earlier than 0:2.46.3-2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410472002" comment="webkit2gtk3-devel is earlier than 0:2.46.3-2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410472003" comment="webkit2gtk3-jsc is earlier than 0:2.46.3-2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410472004" comment="webkit2gtk3-jsc-devel is earlier than 0:2.46.3-2.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240156" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:0156: .NET 6.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:0156" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0156"/>
        <reference ref_id="CVE-2024-0056" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0056"/>
        <reference ref_id="CVE-2024-0057" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0057"/>
        <reference ref_id="CVE-2024-21319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21319"/>
        <reference ref_id="ALSA-2024:0156" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0156.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.126 and .NET Runtime 6.0.26.

Security Fix(es):

* dotnet: Information Disclosure: MD.SqlClient(MDS) &amp; System.data.SQLClient (SDS) (CVE-2024-0056)
* dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057)
* dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-10"/>
          <updated date="2024-01-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255384" id="2255384"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255386" id="2255386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257566" id="2257566"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2024-0056" impact="Important" cwe="CWE-420" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-0056</cve>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2024-0057" impact="Important" cwe="CWE-295" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-0057</cve>
          <cve public="20240110" href="https://access.redhat.com/security/cve/CVE-2024-21319" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2024-21319</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.26-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.26-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.26-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.26-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.26-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.126-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.126-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.26-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240156017" comment="dotnet-templates-6.0 is earlier than 0:6.0.126-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240249" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0249: java-21-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2024:0249" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0249"/>
        <reference ref_id="CVE-2024-20918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20918"/>
        <reference ref_id="CVE-2024-20919" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20919"/>
        <reference ref_id="CVE-2024-20921" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20921"/>
        <reference ref_id="CVE-2024-20945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20945"/>
        <reference ref_id="CVE-2024-20952" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20952"/>
        <reference ref_id="ALSA-2024:0249" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0249.html"/>
        <description>The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.

Security Fix(es):

* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918)
* OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952)
* OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919)
* OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)
* OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-17"/>
          <updated date="2024-01-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257728" id="2257728"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257837" id="2257837"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257853" id="2257853"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257859" id="2257859"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257874" id="2257874"></bugzilla>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20918" impact="Important" cwe="CWE-190-&gt;(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20918</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20919" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-20919</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20921" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20921</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20945" impact="Moderate" cwe="CWE-532" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20945</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20952" impact="Important" cwe="CWE-385" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20952</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249046" comment="java-21-openjdk is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738002" comment="java-21-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249047" comment="java-21-openjdk-demo is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738004" comment="java-21-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249048" comment="java-21-openjdk-demo-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738006" comment="java-21-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249049" comment="java-21-openjdk-demo-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738008" comment="java-21-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249050" comment="java-21-openjdk-devel is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738010" comment="java-21-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249051" comment="java-21-openjdk-devel-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738012" comment="java-21-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249052" comment="java-21-openjdk-devel-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738014" comment="java-21-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249053" comment="java-21-openjdk-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738016" comment="java-21-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249054" comment="java-21-openjdk-headless is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738018" comment="java-21-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249055" comment="java-21-openjdk-headless-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738020" comment="java-21-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249056" comment="java-21-openjdk-headless-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738022" comment="java-21-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249057" comment="java-21-openjdk-javadoc is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738024" comment="java-21-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249058" comment="java-21-openjdk-javadoc-zip is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738026" comment="java-21-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249059" comment="java-21-openjdk-jmods is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738028" comment="java-21-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249060" comment="java-21-openjdk-jmods-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738030" comment="java-21-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249061" comment="java-21-openjdk-jmods-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738032" comment="java-21-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249062" comment="java-21-openjdk-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738034" comment="java-21-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249063" comment="java-21-openjdk-src is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738036" comment="java-21-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249064" comment="java-21-openjdk-src-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738038" comment="java-21-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249065" comment="java-21-openjdk-src-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738040" comment="java-21-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249066" comment="java-21-openjdk-static-libs is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738042" comment="java-21-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249067" comment="java-21-openjdk-static-libs-fastdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738044" comment="java-21-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240249068" comment="java-21-openjdk-static-libs-slowdebug is earlier than 1:21.0.2.0.13-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738046" comment="java-21-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240265" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0265: java-1.8.0-openjdk security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2024:0265" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0265"/>
        <reference ref_id="CVE-2024-20918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20918"/>
        <reference ref_id="CVE-2024-20919" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20919"/>
        <reference ref_id="CVE-2024-20921" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20921"/>
        <reference ref_id="CVE-2024-20926" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20926"/>
        <reference ref_id="CVE-2024-20945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20945"/>
        <reference ref_id="CVE-2024-20952" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20952"/>
        <reference ref_id="ALSA-2024:0265" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0265.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918)
* OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952)
* OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919)
* OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)
* OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926)
* OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* In the previous release in October 2023 (8u392), the RPMs on AlmaLinux 8 were changed to use Provides for java, jre, java-headless, jre-headless, java-devel and java-sdk which included the full RPM version. This prevented the Provides being used to resolve a dependency on Java 1.8.0 (for example, "Requires: java-headless 1:1.8.0"). This change has now been reverted to the old "1:1.8.0" value. (AlmaLinux-19636, AlmaLinux-19637)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-17"/>
          <updated date="2024-01-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257728" id="2257728"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257837" id="2257837"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257850" id="2257850"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257853" id="2257853"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257859" id="2257859"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257874" id="2257874"></bugzilla>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20918" impact="Important" cwe="CWE-190-&gt;(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20918</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20919" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-20919</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20921" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20921</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20926" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20926</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20945" impact="Moderate" cwe="CWE-532" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20945</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20952" impact="Important" cwe="CWE-385" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20952</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240265025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.402.b06-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240266" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0266: java-11-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2024:0266" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0266"/>
        <reference ref_id="CVE-2024-20918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20918"/>
        <reference ref_id="CVE-2024-20919" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20919"/>
        <reference ref_id="CVE-2024-20921" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20921"/>
        <reference ref_id="CVE-2024-20926" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20926"/>
        <reference ref_id="CVE-2024-20945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20945"/>
        <reference ref_id="CVE-2024-20952" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20952"/>
        <reference ref_id="ALSA-2024:0266" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0266.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918)
* OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952)
* OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919)
* OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)
* OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926)
* OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-18"/>
          <updated date="2024-01-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257728" id="2257728"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257837" id="2257837"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257850" id="2257850"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257853" id="2257853"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257859" id="2257859"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257874" id="2257874"></bugzilla>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20918" impact="Important" cwe="CWE-190-&gt;(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20918</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20919" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-20919</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20921" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20921</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20926" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20926</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20945" impact="Moderate" cwe="CWE-532" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20945</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20952" impact="Important" cwe="CWE-385" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20952</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266001" comment="java-11-openjdk is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266003" comment="java-11-openjdk-demo is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266009" comment="java-11-openjdk-devel is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266017" comment="java-11-openjdk-headless is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266027" comment="java-11-openjdk-jmods is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266035" comment="java-11-openjdk-src is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240266045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.22.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240267" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0267: java-17-openjdk security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2024:0267" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0267"/>
        <reference ref_id="CVE-2024-20918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20918"/>
        <reference ref_id="CVE-2024-20919" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20919"/>
        <reference ref_id="CVE-2024-20921" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20921"/>
        <reference ref_id="CVE-2024-20932" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20932"/>
        <reference ref_id="CVE-2024-20945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20945"/>
        <reference ref_id="CVE-2024-20952" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20952"/>
        <reference ref_id="ALSA-2024:0267" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0267.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918)
* OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) (CVE-2024-20932)
* OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952)
* OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919)
* OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)
* OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* When Transparent Huge Pages (THP) are unconditionally enabled on a system, Java applications using many threads were found to have a large Resident Set Size (RSS). This was due to a race between the kernel transforming thread stack memory into huge pages and the Java Virtual Machine (JVM) shattering these pages into smaller ones when adding a guard page. This release resolves this issue by getting glibc to insert a guard page and prevent the creation of huge pages. (AlmaLinux-13930, AlmaLinux-13931, AlmaLinux-13934, AlmaLinux-13935)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-17"/>
          <updated date="2024-01-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257720" id="2257720"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257728" id="2257728"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257837" id="2257837"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257853" id="2257853"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257859" id="2257859"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257874" id="2257874"></bugzilla>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20918" impact="Important" cwe="CWE-190-&gt;(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20918</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20919" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-20919</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20921" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20921</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20932" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-20932</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20945" impact="Moderate" cwe="CWE-532" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-20945</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20952" impact="Important" cwe="CWE-385" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-20952</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267001" comment="java-17-openjdk is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267003" comment="java-17-openjdk-demo is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267009" comment="java-17-openjdk-devel is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267017" comment="java-17-openjdk-headless is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267027" comment="java-17-openjdk-jmods is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267035" comment="java-17-openjdk-src is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240267045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.10.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240310" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0310: openssl security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0310" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0310"/>
        <reference ref_id="CVE-2023-5363" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5363"/>
        <reference ref_id="ALSA-2024:0310" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0310.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: Incorrect cipher key and IV length processing (CVE-2023-5363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-22"/>
          <updated date="2024-01-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243839" id="2243839"></bugzilla>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5363" impact="Moderate" cwe="CWE-325" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-5363</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240310001" comment="openssl is earlier than 1:3.0.7-25.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240310008" comment="openssl-devel is earlier than 1:3.0.7-25.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240310009" comment="openssl-libs is earlier than 1:3.0.7-25.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240310007" comment="openssl-perl is earlier than 1:3.0.7-25.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240387" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0387: php:8.1 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0387" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0387"/>
        <reference ref_id="CVE-2023-0567" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0567"/>
        <reference ref_id="CVE-2023-0568" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0568"/>
        <reference ref_id="CVE-2023-0662" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-0662"/>
        <reference ref_id="CVE-2023-3247" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3247"/>
        <reference ref_id="CVE-2023-3823" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3823"/>
        <reference ref_id="CVE-2023-3824" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3824"/>
        <reference ref_id="ALSA-2024:0387" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0387.html"/>
        <description>PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

Security Fix(es):

* php: 1-byte array overrun in common path resolve code (CVE-2023-0568)
* php: DoS vulnerability when parsing multipart request body (CVE-2023-0662)
* php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)
* php: XML loading external entity without being enabled (CVE-2023-3823)
* php: phar Buffer mismanagement (CVE-2023-3824)
* php: Password_verify() always return true with some hash (CVE-2023-0567)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-24"/>
          <updated date="2024-01-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2170761" id="2170761"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170770" id="2170770"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2170771" id="2170771"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2219290" id="2219290"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2229396" id="2229396"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2230101" id="2230101"></bugzilla>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-0567" impact="Low" cwe="CWE-328" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-0567</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-0568" impact="Moderate" cwe="CWE-770-&gt;CWE-131" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-0568</cve>
          <cve public="20230215" href="https://access.redhat.com/security/cve/CVE-2023-0662" impact="Moderate" cwe="CWE-400-&gt;CWE-779" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-0662</cve>
          <cve public="20230703" href="https://access.redhat.com/security/cve/CVE-2023-3247" impact="Moderate" cwe="(CWE-252|CWE-334)" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-3247</cve>
          <cve public="20230803" href="https://access.redhat.com/security/cve/CVE-2023-3823" impact="Important" cwe="CWE-611" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L">CVE-2023-3823</cve>
          <cve public="20230803" href="https://access.redhat.com/security/cve/CVE-2023-3824" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3824</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232417063" comment="Module php:8.1 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387062" comment="php is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904002" comment="php is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387063" comment="php-bcmath is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904004" comment="php-bcmath is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387064" comment="php-cli is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904006" comment="php-cli is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387065" comment="php-common is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904008" comment="php-common is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387066" comment="php-dba is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904010" comment="php-dba is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387067" comment="php-dbg is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904012" comment="php-dbg is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387068" comment="php-devel is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904014" comment="php-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387069" comment="php-embedded is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904016" comment="php-embedded is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387070" comment="php-enchant is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904018" comment="php-enchant is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387071" comment="php-ffi is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904020" comment="php-ffi is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387072" comment="php-fpm is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904022" comment="php-fpm is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387073" comment="php-gd is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904024" comment="php-gd is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387074" comment="php-gmp is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904026" comment="php-gmp is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387075" comment="php-intl is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904028" comment="php-intl is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387076" comment="php-ldap is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904030" comment="php-ldap is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387077" comment="php-mbstring is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904032" comment="php-mbstring is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387078" comment="php-mysqlnd is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904034" comment="php-mysqlnd is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387079" comment="php-odbc is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904036" comment="php-odbc is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387080" comment="php-opcache is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904038" comment="php-opcache is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387081" comment="php-pdo is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904040" comment="php-pdo is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387082" comment="php-pecl-apcu is earlier than 0:5.1.21-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417044" comment="php-pecl-apcu is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387083" comment="php-pecl-apcu-devel is earlier than 0:5.1.21-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417046" comment="php-pecl-apcu-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387084" comment="php-pecl-rrd is earlier than 0:2.0.3-4.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417048" comment="php-pecl-rrd is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387085" comment="php-pecl-xdebug3 is earlier than 0:3.1.4-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417050" comment="php-pecl-xdebug3 is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387086" comment="php-pecl-zip is earlier than 0:1.20.1-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417052" comment="php-pecl-zip is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387087" comment="php-pgsql is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904042" comment="php-pgsql is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387088" comment="php-process is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904044" comment="php-process is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387089" comment="php-snmp is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904046" comment="php-snmp is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387090" comment="php-soap is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904048" comment="php-soap is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387091" comment="php-xml is earlier than 0:8.1.27-1.module_el9.3.0+53+44872dd1"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20225904050" comment="php-xml is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240387092" comment="apcu-panel is earlier than 0:5.1.21-1.module_el9.1.0+15+94ba28e4"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20232417002" comment="apcu-panel is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240463" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:0463: rpm security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0463" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0463"/>
        <reference ref_id="CVE-2021-35937" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-35937"/>
        <reference ref_id="CVE-2021-35938" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-35938"/>
        <reference ref_id="CVE-2021-35939" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-35939"/>
        <reference ref_id="ALSA-2024:0463" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0463.html"/>
        <description>The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.

Security Fix(es):

* rpm: TOCTOU race in checks for unsafe symlinks (CVE-2021-35937)
* rpm: races with chown/chmod/capabilities calls during installation (CVE-2021-35938)
* rpm: checks for unsafe symlinks are not performed for intermediary directories (CVE-2021-35939)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-25"/>
          <updated date="2024-01-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/1964114" id="1964114"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1964125" id="1964125"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/1964129" id="1964129"></bugzilla>
          <cve public="20210630" href="https://access.redhat.com/security/cve/CVE-2021-35937" impact="Moderate" cwe="(CWE-59|CWE-367)" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H">CVE-2021-35937</cve>
          <cve public="20210630" href="https://access.redhat.com/security/cve/CVE-2021-35938" impact="Moderate" cwe="CWE-59" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H">CVE-2021-35938</cve>
          <cve public="20210630" href="https://access.redhat.com/security/cve/CVE-2021-35939" impact="Moderate" cwe="CWE-59" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H">CVE-2021-35939</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463001" comment="python3-rpm is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463002" comment="python3-rpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463003" comment="rpm is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463004" comment="rpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463007" comment="rpm-build is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463008" comment="rpm-build is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463033" comment="rpm-build-libs is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463010" comment="rpm-build-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463034" comment="rpm-devel is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463014" comment="rpm-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463035" comment="rpm-libs is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463016" comment="rpm-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463017" comment="rpm-plugin-audit is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463018" comment="rpm-plugin-audit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463019" comment="rpm-plugin-fapolicyd is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463020" comment="rpm-plugin-fapolicyd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463021" comment="rpm-plugin-ima is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463022" comment="rpm-plugin-ima is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463023" comment="rpm-plugin-selinux is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463024" comment="rpm-plugin-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463025" comment="rpm-plugin-syslog is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463026" comment="rpm-plugin-syslog is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463027" comment="rpm-plugin-systemd-inhibit is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463028" comment="rpm-plugin-systemd-inhibit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463029" comment="rpm-sign is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463030" comment="rpm-sign is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463036" comment="rpm-sign-libs is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463032" comment="rpm-sign-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463005" comment="rpm-apidocs is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463006" comment="rpm-apidocs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463011" comment="rpm-cron is earlier than 0:4.16.1.3-27.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240463012" comment="rpm-cron is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240465" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0465: sqlite security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0465" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0465"/>
        <reference ref_id="CVE-2023-7104" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-7104"/>
        <reference ref_id="ALSA-2024:0465" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0465.html"/>
        <description>SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

Security Fix(es):

* sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-25"/>
          <updated date="2024-01-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2256194" id="2256194"></bugzilla>
          <cve public="20231229" href="https://access.redhat.com/security/cve/CVE-2023-7104" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2023-7104</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240465001" comment="sqlite is earlier than 0:3.34.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339002" comment="sqlite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240465003" comment="sqlite-devel is earlier than 0:3.34.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339004" comment="sqlite-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240465005" comment="sqlite-libs is earlier than 0:3.34.1-7.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230339006" comment="sqlite-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202410384" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:10384: tuned security update (Important)</title>
        <reference ref_id="CVE-2024-52336" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-52336"/>
        <reference ref_id="CVE-2024-52337" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-52337"/>
        <reference ref_id="RHSA-2024:10384" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:10384"/>
        <reference ref_id="ALSA-2024:10384" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-10384.html"/>
        <description>The tuned packages provide a service that tunes system settings according to a selected profile.  

Security Fix(es):  

  * tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336)
  * tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-26"/>
          <updated date="2024-11-26"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2324540" id="2324540"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2324541" id="2324541"></bugzilla>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-52336" impact="Important" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-52336</cve>
          <cve public="20241126" href="https://access.redhat.com/security/cve/CVE-2024-52337" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N">CVE-2024-52337</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384001" comment="tuned-profiles-spectrumscale is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384002" comment="tuned-profiles-spectrumscale is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384003" comment="tuned-utils is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384004" comment="tuned-utils is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384005" comment="tuned is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384006" comment="tuned is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384007" comment="tuned-gtk is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384008" comment="tuned-gtk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384009" comment="tuned-ppd is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384010" comment="tuned-ppd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384011" comment="tuned-profiles-atomic is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384012" comment="tuned-profiles-atomic is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384013" comment="tuned-profiles-cpu-partitioning is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384014" comment="tuned-profiles-cpu-partitioning is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384015" comment="tuned-profiles-mssql is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384016" comment="tuned-profiles-mssql is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384017" comment="tuned-profiles-oracle is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384018" comment="tuned-profiles-oracle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384019" comment="tuned-profiles-postgresql is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384020" comment="tuned-profiles-postgresql is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384021" comment="tuned-profiles-realtime is earlier than 0:2.24.0-2.el9_5.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410384022" comment="tuned-profiles-realtime is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20250925" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:0925: bzip2 security update (Moderate)</title>
        <reference ref_id="CVE-2019-12900" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2019-12900"/>
        <reference ref_id="RHSA-2025:0925" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:0925"/>
        <reference ref_id="ALSA-2025:0925" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-0925.html"/>
        <description>The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs.   

Security Fix(es):  

  * bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). (CVE-2019-12900)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-02-04"/>
          <updated date="2025-02-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2332075" id="2332075"></bugzilla>
          <cve public="20190619" href="https://access.redhat.com/security/cve/CVE-2019-12900" impact="Low" cwe="CWE-787" cvss3="CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2019-12900</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250925001" comment="bzip2 is earlier than 0:1.0.8-10.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250925002" comment="bzip2 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250925003" comment="bzip2-devel is earlier than 0:1.0.8-10.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250925004" comment="bzip2-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250925005" comment="bzip2-libs is earlier than 0:1.0.8-10.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250925006" comment="bzip2-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20245928" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:5928: kernel security update (Important)</title>
        <reference ref_id="CVE-2023-52771" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52771"/>
        <reference ref_id="CVE-2023-52880" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52880"/>
        <reference ref_id="CVE-2024-26581" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26581"/>
        <reference ref_id="CVE-2024-26668" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26668"/>
        <reference ref_id="CVE-2024-26810" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26810"/>
        <reference ref_id="CVE-2024-26855" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26855"/>
        <reference ref_id="CVE-2024-26908" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26908"/>
        <reference ref_id="CVE-2024-26925" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26925"/>
        <reference ref_id="CVE-2024-27016" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27016"/>
        <reference ref_id="CVE-2024-27019" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27019"/>
        <reference ref_id="CVE-2024-27020" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27020"/>
        <reference ref_id="CVE-2024-27415" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27415"/>
        <reference ref_id="CVE-2024-35839" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35839"/>
        <reference ref_id="CVE-2024-35896" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35896"/>
        <reference ref_id="CVE-2024-35897" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35897"/>
        <reference ref_id="CVE-2024-35898" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35898"/>
        <reference ref_id="CVE-2024-35962" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35962"/>
        <reference ref_id="CVE-2024-36003" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36003"/>
        <reference ref_id="CVE-2024-36025" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36025"/>
        <reference ref_id="CVE-2024-38538" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38538"/>
        <reference ref_id="CVE-2024-38540" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38540"/>
        <reference ref_id="CVE-2024-38544" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38544"/>
        <reference ref_id="CVE-2024-38579" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38579"/>
        <reference ref_id="CVE-2024-38608" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38608"/>
        <reference ref_id="CVE-2024-39476" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39476"/>
        <reference ref_id="CVE-2024-40905" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40905"/>
        <reference ref_id="CVE-2024-40911" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40911"/>
        <reference ref_id="CVE-2024-40912" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40912"/>
        <reference ref_id="CVE-2024-40914" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40914"/>
        <reference ref_id="CVE-2024-40929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40929"/>
        <reference ref_id="CVE-2024-40939" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40939"/>
        <reference ref_id="CVE-2024-40941" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40941"/>
        <reference ref_id="CVE-2024-40957" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40957"/>
        <reference ref_id="CVE-2024-40978" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40978"/>
        <reference ref_id="CVE-2024-40983" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40983"/>
        <reference ref_id="CVE-2024-41041" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41041"/>
        <reference ref_id="CVE-2024-41076" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41076"/>
        <reference ref_id="CVE-2024-41090" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41090"/>
        <reference ref_id="CVE-2024-41091" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41091"/>
        <reference ref_id="CVE-2024-42110" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42110"/>
        <reference ref_id="CVE-2024-42152" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42152"/>
        <reference ref_id="RHSA-2024:5928" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:5928"/>
        <reference ref_id="ALSA-2024:5928" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-5928.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: nftables: nft_set_rbtree skip end interval element from gc (CVE-2024-26581)
  * kernel: netfilter: nft_limit: reject configurations that cause integer overflow (CVE-2024-26668)
  * kernel: vfio/pci: Lock external INTx masking ops (CVE-2024-26810)
  * kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (CVE-2024-26855)
  * kernel: x86/xen: Add some null pointer checking to smp.c (CVE-2024-26908)
  * kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (CVE-2024-26925)
  * kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (CVE-2024-27020)
  * kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (CVE-2024-27019)
  * kernel: netfilter: flowtable: validate pppoe header (CVE-2024-27016)
  * kernel: netfilter: bridge: confirm multicast packets before passing them up the stack (CVE-2024-27415)
  * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839)
  * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
  * kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion (CVE-2024-35897)
  * kernel: netfilter: validate user input for expected length (CVE-2024-35896)
  * kernel: netfilter: complete validation of user input (CVE-2024-35962)
  * kernel: ice: fix LAG and VF lock dependency in ice_reset_vf() (CVE-2024-36003)
  * kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race (CVE-2023-52771)
  * kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (CVE-2023-52880)
  * kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (CVE-2024-36025)
  * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)
  * kernel: crypto: bcm - Fix pointer arithmetic (CVE-2024-38579)
  * kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (CVE-2024-38544)
  * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540)
  * kernel: net: bridge: xmit: make sure we have at least eth header len bytes (CVE-2024-38538)
  * kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (CVE-2024-39476)
  * kernel: ipv6: fix possible race in __fib6_drop_pcpu_from() (CVE-2024-40905)
  * kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station (CVE-2024-40911)
  * kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (CVE-2024-40912)
  * kernel: mm/huge_memory: don&amp;#39;t unpoison huge_zero_folio (CVE-2024-40914)
  * kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (CVE-2024-40929)
  * kernel: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (CVE-2024-40939)
  * kernel: wifi: iwlwifi: mvm: don&amp;#39;t read past the mfuart notifcation (CVE-2024-40941)
  * kernel: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (CVE-2024-40957)
  * kernel: scsi: qedi: Fix crash while reading debugfs attribute (CVE-2024-40978)
  * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983)
  * kernel: virtio-net: tap: mlx5_core short frame denial of service (CVE-2024-41090)
  * kernel: virtio-net: tun: mlx5_core short frame denial of service (CVE-2024-41091)
  * kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (CVE-2024-41041)
  * kernel: NFSv4: Fix memory leak in nfs4_set_security_label (CVE-2024-41076)
  * kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (CVE-2024-42110)
  * kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment (CVE-2024-42152)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-08-28"/>
          <updated date="2024-08-28"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265185" id="2265185"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2272797" id="2272797"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273654" id="2273654"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275742" id="2275742"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275744" id="2275744"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277166" id="2277166"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278256" id="2278256"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278258" id="2278258"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278264" id="2278264"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281101" id="2281101"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281284" id="2281284"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281669" id="2281669"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281672" id="2281672"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281675" id="2281675"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281916" id="2281916"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281958" id="2281958"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282720" id="2282720"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2283468" id="2283468"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284421" id="2284421"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293356" id="2293356"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293414" id="2293414"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293455" id="2293455"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293459" id="2293459"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293461" id="2293461"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295914" id="2295914"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297489" id="2297489"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297495" id="2297495"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297496" id="2297496"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297498" id="2297498"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297513" id="2297513"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297523" id="2297523"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297525" id="2297525"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297541" id="2297541"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297562" id="2297562"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297567" id="2297567"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2299240" id="2299240"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2299336" id="2299336"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300410" id="2300410"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300453" id="2300453"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2301473" id="2301473"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2301519" id="2301519"></bugzilla>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2023-52771" impact="Low" cwe="CWE-413" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52771</cve>
          <cve public="20240524" href="https://access.redhat.com/security/cve/CVE-2023-52880" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52880</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-26581" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-26581</cve>
          <cve public="20240402" href="https://access.redhat.com/security/cve/CVE-2024-26668" impact="Low" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2024-26668</cve>
          <cve public="20240405" href="https://access.redhat.com/security/cve/CVE-2024-26810" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26810</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26855" impact="Moderate" cwe="CWE-690" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26855</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26908" impact="Moderate" cwe="CWE-690" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26908</cve>
          <cve public="20240424" href="https://access.redhat.com/security/cve/CVE-2024-26925" impact="Moderate" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-26925</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27016" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27016</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27019" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27019</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27020" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27020</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-27415" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27415</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35839" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35839</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35896" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35896</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35897" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35897</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35898" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35898</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-35962" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35962</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-36003" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36003</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36025" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H">CVE-2024-36025</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38538" impact="Moderate" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38538</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38540" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38540</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38544" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H">CVE-2024-38544</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38579" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38579</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38608" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38608</cve>
          <cve public="20240705" href="https://access.redhat.com/security/cve/CVE-2024-39476" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-39476</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40905" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40905</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40911" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40911</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40912" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40912</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40914" impact="Moderate" cwe="CWE-911" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40914</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40929" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40929</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40939" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40939</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40941" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40941</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40957" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40957</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40978" impact="Low" cwe="CWE-822" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40978</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40983" impact="Moderate" cwe="CWE-911" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40983</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41041" impact="Low" cwe="CWE-911" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-41041</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41076" impact="Low" cwe="CWE-401" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-41076</cve>
          <cve public="20240724" href="https://access.redhat.com/security/cve/CVE-2024-41090" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H">CVE-2024-41090</cve>
          <cve public="20240724" href="https://access.redhat.com/security/cve/CVE-2024-41091" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H">CVE-2024-41091</cve>
          <cve public="20240730" href="https://access.redhat.com/security/cve/CVE-2024-42110" impact="Moderate" cwe="CWE-372" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42110</cve>
          <cve public="20240730" href="https://access.redhat.com/security/cve/CVE-2024-42152" impact="Moderate" cwe="CWE-404" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42152</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928001" comment="bpftool is earlier than 0:7.3.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928002" comment="kernel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928003" comment="kernel-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928004" comment="kernel-debug is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928005" comment="kernel-debug-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928012" comment="kernel-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928014" comment="kernel-headers is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928015" comment="kernel-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928016" comment="kernel-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928018" comment="kernel-tools is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928021" comment="perf is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928022" comment="python3-perf is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928023" comment="rtla is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928024" comment="rv is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928032" comment="kernel-rt is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928033" comment="kernel-rt-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928044" comment="kernel-64k is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928045" comment="kernel-64k-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928060" comment="libperf is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245928062" comment="kernel-doc is earlier than 0:5.14.0-427.33.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240466" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0466: python3.9 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0466" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0466"/>
        <reference ref_id="CVE-2023-27043" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27043"/>
        <reference ref_id="ALSA-2024:0466" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0466.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-25"/>
          <updated date="2024-01-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2196183" id="2196183"></bugzilla>
          <cve public="20230419" href="https://access.redhat.com/security/cve/CVE-2023-27043" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-27043</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466003" comment="python3 is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466005" comment="python3-debug is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466007" comment="python3-devel is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466009" comment="python3-idle is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466011" comment="python3-libs is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466013" comment="python3-test is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466015" comment="python3-tkinter is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240466001" comment="python-unversioned-command is earlier than 0:3.9.18-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240468" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0468: grub2 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0468" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0468"/>
        <reference ref_id="CVE-2023-4001" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4001"/>
        <reference ref_id="ALSA-2024:0468" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0468.html"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

Security Fix(es):

* grub2: bypass the GRUB password protection feature (CVE-2023-4001)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-25"/>
          <updated date="2024-01-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2224951" id="2224951"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2023-4001" impact="Moderate" cwe="CWE-290" cvss3="CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2023-4001</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468030" comment="grub2-efi-aa64 is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099004" comment="grub2-efi-aa64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468031" comment="grub2-efi-aa64-cdboot is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099006" comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468032" comment="grub2-efi-x64 is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099010" comment="grub2-efi-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468033" comment="grub2-efi-x64-cdboot is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099012" comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468034" comment="grub2-pc is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099016" comment="grub2-pc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468035" comment="grub2-ppc64le is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099020" comment="grub2-ppc64le is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468036" comment="grub2-tools is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099024" comment="grub2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468037" comment="grub2-tools-efi is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099026" comment="grub2-tools-efi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468038" comment="grub2-tools-extra is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099028" comment="grub2-tools-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468039" comment="grub2-tools-minimal is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099030" comment="grub2-tools-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468040" comment="grub2-common is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099002" comment="grub2-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468041" comment="grub2-efi-aa64-modules is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099008" comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468042" comment="grub2-efi-x64-modules is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099014" comment="grub2-efi-x64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468043" comment="grub2-pc-modules is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099018" comment="grub2-pc-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240468044" comment="grub2-ppc64le-modules is earlier than 1:2.06-70.el9_3.2.alma.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099022" comment="grub2-ppc64le-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240474" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:0474: tomcat security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0474" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0474"/>
        <reference ref_id="CVE-2023-41080" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-41080"/>
        <reference ref_id="CVE-2023-42794" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42794"/>
        <reference ref_id="CVE-2023-42795" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42795"/>
        <reference ref_id="CVE-2023-45648" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45648"/>
        <reference ref_id="ALSA-2024:0474" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0474.html"/>
        <description>Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Security Fix(es):

* tomcat: Open Redirect vulnerability in FORM authentication (CVE-2023-41080)
* tomcat: FileUpload: DoS due to accumulation of temporary files on Windows (CVE-2023-42794)
* tomcat: improper cleaning of recycled objects could lead to information leak (CVE-2023-42795)
* tomcat: incorrectly parsed http trailer headers can cause request smuggling (CVE-2023-45648)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-25"/>
          <updated date="2024-01-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235370" id="2235370"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243749" id="2243749"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243751" id="2243751"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2243752" id="2243752"></bugzilla>
          <cve public="20230828" href="https://access.redhat.com/security/cve/CVE-2023-41080" impact="Moderate" cwe="CWE-601" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-41080</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-42794" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-42794</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-42795" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-42795</cve>
          <cve public="20231010" href="https://access.redhat.com/security/cve/CVE-2023-45648" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-45648</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474001" comment="tomcat is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929002" comment="tomcat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474003" comment="tomcat-admin-webapps is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929004" comment="tomcat-admin-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474005" comment="tomcat-docs-webapp is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929006" comment="tomcat-docs-webapp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474007" comment="tomcat-el-3.0-api is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929008" comment="tomcat-el-3.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474009" comment="tomcat-jsp-2.3-api is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929010" comment="tomcat-jsp-2.3-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474011" comment="tomcat-lib is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929012" comment="tomcat-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474013" comment="tomcat-servlet-4.0-api is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929014" comment="tomcat-servlet-4.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240474015" comment="tomcat-webapps is earlier than 1:9.0.62-37.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929016" comment="tomcat-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248446" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8446: python3.9 security update (Moderate)</title>
        <reference ref_id="CVE-2024-6232" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6232"/>
        <reference ref_id="RHSA-2024:8446" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8446"/>
        <reference ref_id="ALSA-2024:8446" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8446.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.  

Security Fix(es):  

  * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-24"/>
          <updated date="2024-10-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2309426" id="2309426"></bugzilla>
          <cve public="20240903" href="https://access.redhat.com/security/cve/CVE-2024-6232" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-6232</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446001" comment="python3 is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446002" comment="python3-devel is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446003" comment="python3-libs is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446004" comment="python3-tkinter is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446005" comment="python3-debug is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446006" comment="python3-idle is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446007" comment="python3-test is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248446008" comment="python-unversioned-command is earlier than 0:3.9.18-3.el9_4.6"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248447" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8447: python3.12 security update (Moderate)</title>
        <reference ref_id="CVE-2024-6232" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6232"/>
        <reference ref_id="RHSA-2024:8447" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8447"/>
        <reference ref_id="ALSA-2024:8447" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8447.html"/>
        <description>Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.  

Security Fix(es):  

  * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-24"/>
          <updated date="2024-10-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2309426" id="2309426"></bugzilla>
          <cve public="20240903" href="https://access.redhat.com/security/cve/CVE-2024-6232" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-6232</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447001" comment="python3.12 is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146015" comment="python3.12 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447002" comment="python3.12-devel is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146017" comment="python3.12-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447003" comment="python3.12-libs is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146019" comment="python3.12-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447004" comment="python3.12-tkinter is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146021" comment="python3.12-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447005" comment="python3.12-debug is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146016" comment="python3.12-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447006" comment="python3.12-idle is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146018" comment="python3.12-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248447007" comment="python3.12-test is earlier than 0:3.12.1-4.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246146020" comment="python3.12-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240533" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:0533: gnutls security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0533" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0533"/>
        <reference ref_id="CVE-2023-5981" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5981"/>
        <reference ref_id="CVE-2024-0553" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0553"/>
        <reference ref_id="CVE-2024-0567" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0567"/>
        <reference ref_id="ALSA-2024:0533" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0533.html"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981)
* gnutls: incomplete fix for CVE-2023-5981 (CVE-2024-0553)
* gnutls: rejects certificate chain with distributed trust (CVE-2024-0567)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-29"/>
          <updated date="2024-01-29"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2248445" id="2248445"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258412" id="2258412"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258544" id="2258544"></bugzilla>
          <cve public="20231115" href="https://access.redhat.com/security/cve/CVE-2023-5981" impact="Moderate" cwe="CWE-1300-&gt;CWE-203" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-5981</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-0553" impact="Moderate" cwe="CWE-1300-&gt;CWE-203" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-0553</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-0567" impact="Moderate" cwe="CWE-347" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-0567</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240533001" comment="gnutls is earlier than 0:3.7.6-23.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854002" comment="gnutls is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240533003" comment="gnutls-c++ is earlier than 0:3.7.6-23.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854004" comment="gnutls-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240533005" comment="gnutls-dane is earlier than 0:3.7.6-23.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854006" comment="gnutls-dane is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240533007" comment="gnutls-devel is earlier than 0:3.7.6-23.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854008" comment="gnutls-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240533010" comment="gnutls-utils is earlier than 0:3.7.6-23.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854010" comment="gnutls-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240557" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0557: tigervnc security update (Important)</title>
        <reference ref_id="RHSA-2024:0557" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0557"/>
        <reference ref_id="CVE-2023-6816" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6816"/>
        <reference ref_id="CVE-2024-0229" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0229"/>
        <reference ref_id="CVE-2024-21885" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21885"/>
        <reference ref_id="CVE-2024-21886" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21886"/>
        <reference ref_id="ALSA-2024:0557" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0557.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-30"/>
          <updated date="2024-01-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2256540" id="2256540"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256542" id="2256542"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256690" id="2256690"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257691" id="2257691"></bugzilla>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-6816" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6816</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-0229" impact="Important" cwe="CWE-788" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-0229</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-21885" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-21885</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-21886" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-21886</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557014" comment="tigervnc is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557015" comment="tigervnc-server is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557016" comment="tigervnc-server-minimal is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557017" comment="tigervnc-server-module is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557018" comment="tigervnc-icons is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557019" comment="tigervnc-license is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240557020" comment="tigervnc-selinux is earlier than 0:1.13.1-3.el9_3.6.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240602" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0602: thunderbird security update (Important)</title>
        <reference ref_id="RHSA-2024:0602" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0602"/>
        <reference ref_id="CVE-2024-0741" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0741"/>
        <reference ref_id="CVE-2024-0742" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0742"/>
        <reference ref_id="CVE-2024-0746" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0746"/>
        <reference ref_id="CVE-2024-0747" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0747"/>
        <reference ref_id="CVE-2024-0749" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0749"/>
        <reference ref_id="CVE-2024-0750" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0750"/>
        <reference ref_id="CVE-2024-0751" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0751"/>
        <reference ref_id="CVE-2024-0753" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0753"/>
        <reference ref_id="CVE-2024-0755" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0755"/>
        <reference ref_id="ALSA-2024:0602" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0602.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.7.0.

Security Fix(es):

* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741)
* Mozilla: Failure to update user input timestamp (CVE-2024-0742)
* Mozilla: Crash when listing printers on Linux (CVE-2024-0746)
* Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747)
* Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750)
* Mozilla: Privilege escalation through devtools (CVE-2024-0751)
* Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753)
* Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-30"/>
          <updated date="2024-01-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2259926" id="2259926"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259927" id="2259927"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259928" id="2259928"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259929" id="2259929"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259930" id="2259930"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259931" id="2259931"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259932" id="2259932"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259933" id="2259933"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259934" id="2259934"></bugzilla>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0741" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0741</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0742" impact="Important" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0742</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0746" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0746</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0747" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0747</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0749" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0749</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0750" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0750</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0751" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0751</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0753" impact="Moderate" cwe="CWE-326" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0753</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0755" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0755</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20240602002" comment="thunderbird is earlier than 0:115.7.0-1.el9_3.alma"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240603" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0603: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:0603" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0603"/>
        <reference ref_id="CVE-2024-0741" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0741"/>
        <reference ref_id="CVE-2024-0742" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0742"/>
        <reference ref_id="CVE-2024-0746" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0746"/>
        <reference ref_id="CVE-2024-0747" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0747"/>
        <reference ref_id="CVE-2024-0749" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0749"/>
        <reference ref_id="CVE-2024-0750" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0750"/>
        <reference ref_id="CVE-2024-0751" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0751"/>
        <reference ref_id="CVE-2024-0753" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0753"/>
        <reference ref_id="CVE-2024-0755" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0755"/>
        <reference ref_id="ALSA-2024:0603" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0603.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.7.0 ESR.

Security Fix(es):

* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741)
* Mozilla: Failure to update user input timestamp (CVE-2024-0742)
* Mozilla: Crash when listing printers on Linux (CVE-2024-0746)
* Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747)
* Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750)
* Mozilla: Privilege escalation through devtools (CVE-2024-0751)
* Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753)
* Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-01-30"/>
          <updated date="2024-01-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2259926" id="2259926"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259927" id="2259927"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259928" id="2259928"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259929" id="2259929"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259930" id="2259930"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259931" id="2259931"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259932" id="2259932"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259933" id="2259933"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259934" id="2259934"></bugzilla>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0741" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0741</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0742" impact="Important" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0742</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0746" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0746</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0747" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0747</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0749" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0749</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0750" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0750</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0751" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0751</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0753" impact="Moderate" cwe="CWE-326" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-0753</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0755" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0755</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240603004" comment="firefox is earlier than 0:115.7.0-1.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240603005" comment="firefox-x11 is earlier than 0:115.7.0-1.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20253344" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:3344: grafana security update (Important)</title>
        <reference ref_id="CVE-2025-30204" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2025-30204"/>
        <reference ref_id="RHSA-2025:3344" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:3344"/>
        <reference ref_id="ALSA-2025:3344" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-3344.html"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB.   

Security Fix(es):  

  * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-03-27"/>
          <updated date="2025-03-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2354195" id="2354195"></bugzilla>
          <cve public="20250321" href="https://access.redhat.com/security/cve/CVE-2025-30204" impact="Important" cwe="CWE-405" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2025-30204</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253344001" comment="grafana is earlier than 0:10.2.6-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225716002" comment="grafana is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20253344002" comment="grafana-selinux is earlier than 0:10.2.6-9.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242568004" comment="grafana-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248162" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8162: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2021-47385" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47385"/>
        <reference ref_id="CVE-2023-28746" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28746"/>
        <reference ref_id="CVE-2023-52658" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52658"/>
        <reference ref_id="CVE-2024-27403" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27403"/>
        <reference ref_id="CVE-2024-35989" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35989"/>
        <reference ref_id="CVE-2024-36889" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36889"/>
        <reference ref_id="CVE-2024-36978" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36978"/>
        <reference ref_id="CVE-2024-38556" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38556"/>
        <reference ref_id="CVE-2024-39483" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39483"/>
        <reference ref_id="CVE-2024-39502" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39502"/>
        <reference ref_id="CVE-2024-40959" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40959"/>
        <reference ref_id="CVE-2024-42079" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42079"/>
        <reference ref_id="CVE-2024-42272" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42272"/>
        <reference ref_id="CVE-2024-42284" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42284"/>
        <reference ref_id="RHSA-2024:8162" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8162"/>
        <reference ref_id="ALSA-2024:8162" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8162.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)
  * kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)
  * kernel: Revert &amp;#34;net/mlx5: Block entering switchdev mode with ns inconsistency&amp;#34; (CVE-2023-52658)
  * kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989)
  * kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385)
  * kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889)
  * kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)
  * kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556)
  * kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483)
  * kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)
  * kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959)
  * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
  * kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272)
  * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-10-16"/>
          <updated date="2024-10-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2270700" id="2270700"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281127" id="2281127"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281149" id="2281149"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281847" id="2281847"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282355" id="2282355"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284571" id="2284571"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293078" id="2293078"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293443" id="2293443"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295921" id="2295921"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297474" id="2297474"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297543" id="2297543"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300517" id="2300517"></bugzilla>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2021-47385" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2021-47385</cve>
          <cve public="20240214" href="https://access.redhat.com/security/cve/CVE-2023-28746" impact="Moderate" cwe="CWE-1342" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N">CVE-2023-28746</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2023-52658" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52658</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-27403" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27403</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-35989" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35989</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36889" impact="Moderate" cwe="CWE-665" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36889</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-36978" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36978</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38556" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38556</cve>
          <cve public="20240705" href="https://access.redhat.com/security/cve/CVE-2024-39483" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-39483</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-39502" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-39502</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40959" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40959</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-42079" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42079</cve>
          <cve public="20240817" href="https://access.redhat.com/security/cve/CVE-2024-42272" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42272</cve>
          <cve public="20240817" href="https://access.redhat.com/security/cve/CVE-2024-42284" impact="Moderate" cwe="CWE-393" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2024-42284</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162001" comment="bpftool is earlier than 0:7.3.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162002" comment="kernel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162003" comment="kernel-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162004" comment="kernel-debug is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162005" comment="kernel-debug-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162012" comment="kernel-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162014" comment="kernel-headers is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162015" comment="kernel-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162016" comment="kernel-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162018" comment="kernel-tools is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162021" comment="perf is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162022" comment="python3-perf is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162023" comment="rtla is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162024" comment="rv is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162026" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162027" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162028" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162029" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162030" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162031" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162032" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162033" comment="kernel-rt is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162034" comment="kernel-rt-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162035" comment="kernel-rt-debug is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162036" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162037" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162038" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162039" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162040" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162041" comment="kernel-rt-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162042" comment="kernel-rt-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162043" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162044" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162045" comment="kernel-64k is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162046" comment="kernel-64k-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162047" comment="kernel-64k-debug is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162048" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162049" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162050" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162051" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162052" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162053" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162054" comment="kernel-64k-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162055" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162056" comment="kernel-64k-modules is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162057" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162058" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162059" comment="kernel-cross-headers is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162060" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162061" comment="libperf is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162063" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162064" comment="kernel-doc is earlier than 0:5.14.0-427.40.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240670" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0670: runc security update (Important)</title>
        <reference ref_id="RHSA-2024:0670" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0670"/>
        <reference ref_id="CVE-2024-21626" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21626"/>
        <reference ref_id="ALSA-2024:0670" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0670.html"/>
        <description>The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* runc: file descriptor leak (CVE-2024-21626)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-02"/>
          <updated date="2024-02-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2258725" id="2258725"></bugzilla>
          <cve public="20240131" href="https://access.redhat.com/security/cve/CVE-2024-21626" impact="Important" cwe="CWE-200" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2024-21626</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20240670001" comment="runc is earlier than 4:1.1.12-1.el9_3"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244762002" comment="runc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240675" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0675: gimp security update (Important)</title>
        <reference ref_id="RHSA-2024:0675" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0675"/>
        <reference ref_id="CVE-2023-44441" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44441"/>
        <reference ref_id="CVE-2023-44442" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44442"/>
        <reference ref_id="CVE-2023-44443" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44443"/>
        <reference ref_id="CVE-2023-44444" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-44444"/>
        <reference ref_id="ALSA-2024:0675" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0675.html"/>
        <description>The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.

Security Fix(es):

* gimp: dds buffer overflow RCE (CVE-2023-44441)
* gimp: PSD buffer overflow RCE (CVE-2023-44442)
* gimp: psp integer overflow RCE (CVE-2023-44443)
* gimp: psp off-by-one RCE (CVE-2023-44444)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-05"/>
          <updated date="2024-02-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2249938" id="2249938"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2249942" id="2249942"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2249944" id="2249944"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2249946" id="2249946"></bugzilla>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-44441" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-44441</cve>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-44442" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-44442</cve>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-44443" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-44443</cve>
          <cve public="20231114" href="https://access.redhat.com/security/cve/CVE-2023-44444" impact="Important" cwe="CWE-193" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-44444</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240675001" comment="gimp is earlier than 2:2.99.8-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227978002" comment="gimp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240675004" comment="gimp-libs is earlier than 2:2.99.8-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227978004" comment="gimp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240790" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:0790: nss security update (Moderate)</title>
        <reference ref_id="RHSA-2024:0790" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0790"/>
        <reference ref_id="CVE-2023-6135" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6135"/>
        <reference ref_id="ALSA-2024:0790" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0790.html"/>
        <description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

Security Fix(es):

* nss: vulnerable to Minerva side-channel information leak (CVE-2023-6135)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-12"/>
          <updated date="2024-02-12"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2249906" id="2249906"></bugzilla>
          <cve public="20231219" href="https://access.redhat.com/security/cve/CVE-2023-6135" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N">CVE-2023-6135</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790001" comment="nspr is earlier than 0:4.35.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368002" comment="nspr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790003" comment="nspr-devel is earlier than 0:4.35.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368004" comment="nspr-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790005" comment="nss is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368006" comment="nss is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790007" comment="nss-devel is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368008" comment="nss-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790009" comment="nss-softokn is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368010" comment="nss-softokn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790011" comment="nss-softokn-devel is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368012" comment="nss-softokn-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790013" comment="nss-softokn-freebl is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368014" comment="nss-softokn-freebl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790015" comment="nss-softokn-freebl-devel is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368016" comment="nss-softokn-freebl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790024" comment="nss-sysinit is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368018" comment="nss-sysinit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790025" comment="nss-tools is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368020" comment="nss-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790021" comment="nss-util is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368022" comment="nss-util is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240790023" comment="nss-util-devel is earlier than 0:3.90.0-6.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231368024" comment="nss-util-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240805" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0805: dotnet7.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:0805" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0805"/>
        <reference ref_id="CVE-2024-21386" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21386"/>
        <reference ref_id="CVE-2024-21404" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21404"/>
        <reference ref_id="ALSA-2024:0805" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0805.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.116 and .NET Runtime 7.0.16.

Security Fix(es):

* dotnet: Denial of Service in SignalR server (CVE-2024-21386)
* dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-13"/>
          <updated date="2024-02-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263085" id="2263085"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263086" id="2263086"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-21386" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21386</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-21404" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21404</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.16-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.16-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.16-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805007" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.16-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805009" comment="dotnet-runtime-7.0 is earlier than 0:7.0.16-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805011" comment="dotnet-sdk-7.0 is earlier than 0:7.0.116-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805013" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.116-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805015" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.16-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240805017" comment="dotnet-templates-7.0 is earlier than 0:7.0.116-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240807" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0807: dotnet6.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:0807" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0807"/>
        <reference ref_id="CVE-2024-21386" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21386"/>
        <reference ref_id="CVE-2024-21404" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21404"/>
        <reference ref_id="ALSA-2024:0807" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0807.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.127 and .NET Runtime 6.0.27.

Security Fix(es):

* dotnet: Denial of Service in SignalR server (CVE-2024-21386)
* dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-13"/>
          <updated date="2024-02-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263085" id="2263085"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263086" id="2263086"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-21386" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21386</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-21404" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21404</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.27-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.27-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.27-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.27-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.27-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.127-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.127-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.27-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240807017" comment="dotnet-templates-6.0 is earlier than 0:6.0.127-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240848" version="641" class="patch">
      <metadata>
        <title>ALSA-2024:0848: .NET 8.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:0848" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0848"/>
        <reference ref_id="CVE-2024-21386" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21386"/>
        <reference ref_id="CVE-2024-21404" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21404"/>
        <reference ref_id="ALSA-2024:0848" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0848.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.102 and .NET Runtime 8.0.2.

Security Fix(es):

* dotnet: Denial of Service in SignalR server (CVE-2024-21386)
* dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-15"/>
          <updated date="2024-02-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263085" id="2263085"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263086" id="2263086"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-21386" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21386</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-21404" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21404</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848001" comment="aspnetcore-runtime-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253002" comment="aspnetcore-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848003" comment="aspnetcore-runtime-dbg-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848004" comment="aspnetcore-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848005" comment="aspnetcore-targeting-pack-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253004" comment="aspnetcore-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848007" comment="dotnet-apphost-pack-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253006" comment="dotnet-apphost-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848009" comment="dotnet-host is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848011" comment="dotnet-hostfxr-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253010" comment="dotnet-hostfxr-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848013" comment="dotnet-runtime-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253012" comment="dotnet-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848015" comment="dotnet-runtime-dbg-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848016" comment="dotnet-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848017" comment="dotnet-sdk-8.0 is earlier than 0:8.0.102-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253014" comment="dotnet-sdk-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848019" comment="dotnet-sdk-8.0-source-built-artifacts is earlier than 0:8.0.102-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253016" comment="dotnet-sdk-8.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848021" comment="dotnet-sdk-dbg-8.0 is earlier than 0:8.0.102-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848022" comment="dotnet-sdk-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848023" comment="dotnet-targeting-pack-8.0 is earlier than 0:8.0.2-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253018" comment="dotnet-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848025" comment="dotnet-templates-8.0 is earlier than 0:8.0.102-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253020" comment="dotnet-templates-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848027" comment="netstandard-targeting-pack-2.1 is earlier than 0:8.0.102-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240950" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0950: postgresql:15 security update (Important)</title>
        <reference ref_id="RHSA-2024:0950" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0950"/>
        <reference ref_id="CVE-2024-0985" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0985"/>
        <reference ref_id="ALSA-2024:0950" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0950.html"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

* postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-22"/>
          <updated date="2024-02-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263384" id="2263384"></bugzilla>
          <cve public="20240208" href="https://access.redhat.com/security/cve/CVE-2024-0985" impact="Important" cwe="CWE-271" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0985</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20234327037" comment="Module postgresql:15 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950036" comment="pg_repack is earlier than 0:1.4.8-1.module_el9.2.0+22+09653793"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20234327002" comment="pg_repack is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950037" comment="pgaudit is earlier than 0:1.7.0-1.module_el9.2.0+22+09653793"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20234327004" comment="pgaudit is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950038" comment="postgres-decoderbufs is earlier than 0:1.9.7-1.Final.module_el9.2.0+22+09653793"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20234327006" comment="postgres-decoderbufs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950039" comment="postgresql is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771002" comment="postgresql is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950040" comment="postgresql-contrib is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771004" comment="postgresql-contrib is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950041" comment="postgresql-docs is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20231693006" comment="postgresql-docs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950042" comment="postgresql-plperl is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771006" comment="postgresql-plperl is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950043" comment="postgresql-plpython3 is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771008" comment="postgresql-plpython3 is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950044" comment="postgresql-pltcl is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771010" comment="postgresql-pltcl is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950045" comment="postgresql-private-devel is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771012" comment="postgresql-private-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950046" comment="postgresql-private-libs is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771014" comment="postgresql-private-libs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950047" comment="postgresql-server is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771016" comment="postgresql-server is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950048" comment="postgresql-server-devel is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771018" comment="postgresql-server-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950049" comment="postgresql-static is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20231693022" comment="postgresql-static is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950050" comment="postgresql-test is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771020" comment="postgresql-test is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950051" comment="postgresql-upgrade is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20224771022" comment="postgresql-upgrade is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950052" comment="postgresql-upgrade-devel is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20231693028" comment="postgresql-upgrade-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20240950053" comment="postgresql-test-rpm-macros is earlier than 0:15.6-1.module_el9.3.0+55+d62f4779"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20234327032" comment="postgresql-test-rpm-macros is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240951" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0951: postgresql security update (Important)</title>
        <reference ref_id="RHSA-2024:0951" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0951"/>
        <reference ref_id="CVE-2024-0985" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0985"/>
        <reference ref_id="ALSA-2024:0951" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0951.html"/>
        <description>PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

* postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-22"/>
          <updated date="2024-02-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263384" id="2263384"></bugzilla>
          <cve public="20240208" href="https://access.redhat.com/security/cve/CVE-2024-0985" impact="Important" cwe="CWE-271" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2024-0985</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951001" comment="postgresql is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771002" comment="postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951003" comment="postgresql-contrib is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771004" comment="postgresql-contrib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951005" comment="postgresql-docs is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693006" comment="postgresql-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951007" comment="postgresql-plperl is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771006" comment="postgresql-plperl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951009" comment="postgresql-plpython3 is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771008" comment="postgresql-plpython3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951011" comment="postgresql-pltcl is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771010" comment="postgresql-pltcl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951013" comment="postgresql-private-devel is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771012" comment="postgresql-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951015" comment="postgresql-private-libs is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771014" comment="postgresql-private-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951017" comment="postgresql-server is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771016" comment="postgresql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951019" comment="postgresql-server-devel is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771018" comment="postgresql-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951021" comment="postgresql-static is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693022" comment="postgresql-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951023" comment="postgresql-test is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771020" comment="postgresql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951025" comment="postgresql-upgrade is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224771022" comment="postgresql-upgrade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240951027" comment="postgresql-upgrade-devel is earlier than 0:13.14-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231693028" comment="postgresql-upgrade-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240952" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0952: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:0952" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0952"/>
        <reference ref_id="CVE-2024-1546" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1546"/>
        <reference ref_id="CVE-2024-1547" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1547"/>
        <reference ref_id="CVE-2024-1548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1548"/>
        <reference ref_id="CVE-2024-1549" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1549"/>
        <reference ref_id="CVE-2024-1550" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1550"/>
        <reference ref_id="CVE-2024-1551" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1551"/>
        <reference ref_id="CVE-2024-1552" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1552"/>
        <reference ref_id="CVE-2024-1553" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1553"/>
        <reference ref_id="ALSA-2024:0952" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0952.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.8.0 ESR.

Security Fix(es):

* Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546)
* Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547)
* Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553)
* Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548)
* Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549)
* Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550)
* Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551)
* Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-22"/>
          <updated date="2024-02-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265349" id="2265349"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265350" id="2265350"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265351" id="2265351"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265352" id="2265352"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265353" id="2265353"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265354" id="2265354"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265355" id="2265355"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265356" id="2265356"></bugzilla>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1546" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-1546</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1547" impact="Important" cwe="CWE-449" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-1547</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1548" impact="Moderate" cwe="CWE-449" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1548</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1549" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1549</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1550" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1550</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1551" impact="Moderate" cwe="CWE-74" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1551</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1552" impact="Low" cwe="CWE-681" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1552</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1553" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-1553</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240952004" comment="firefox is earlier than 0:115.8.0-1.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240952005" comment="firefox-x11 is earlier than 0:115.8.0-1.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240963" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:0963: thunderbird security update (Important)</title>
        <reference ref_id="RHSA-2024:0963" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0963"/>
        <reference ref_id="CVE-2024-1546" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1546"/>
        <reference ref_id="CVE-2024-1547" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1547"/>
        <reference ref_id="CVE-2024-1548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1548"/>
        <reference ref_id="CVE-2024-1549" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1549"/>
        <reference ref_id="CVE-2024-1550" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1550"/>
        <reference ref_id="CVE-2024-1551" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1551"/>
        <reference ref_id="CVE-2024-1552" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1552"/>
        <reference ref_id="CVE-2024-1553" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1553"/>
        <reference ref_id="ALSA-2024:0963" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0963.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.8.0.

Security Fix(es):

* Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546)
* Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547)
* Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553)
* Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548)
* Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549)
* Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550)
* Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551)
* Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-26"/>
          <updated date="2024-02-26"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265349" id="2265349"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265350" id="2265350"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265351" id="2265351"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265352" id="2265352"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265353" id="2265353"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265354" id="2265354"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265355" id="2265355"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265356" id="2265356"></bugzilla>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1546" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-1546</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1547" impact="Important" cwe="CWE-449" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-1547</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1548" impact="Moderate" cwe="CWE-449" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1548</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1549" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1549</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1550" impact="Moderate" cwe="CWE-1021" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1550</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1551" impact="Moderate" cwe="CWE-74" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1551</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1552" impact="Low" cwe="CWE-681" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-1552</cve>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1553" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-1553</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20240963002" comment="thunderbird is earlier than 0:115.8.0-1.el9_3.alma.plus"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242758" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2758: kernel security and bug fix update (Moderate)</title>
        <reference ref_id="CVE-2023-5090" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-5090.html"/>
        <reference ref_id="CVE-2023-6240" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2023-6240.html"/>
        <reference ref_id="CVE-2024-25742" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-25742.html"/>
        <reference ref_id="CVE-2024-25743" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-25743.html"/>
        <reference ref_id="RHSA-2024:2758" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2758"/>
        <reference ref_id="ALSA-2024:2758" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2758.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240)
  * CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743)


Bug Fix(es):  

  * ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:AlmaLinux-27009)
  * mm/mglru: fix underprotected page cache (JIRA:AlmaLinux-29235)
  * [EMR] [TBOOT OS] SUT could not go to S3 state with AlmaLinux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:AlmaLinux-29673)
  * system hangs completely - NMI not possible (JIRA:AlmaLinux-30678)
  * ice 0000:6f:00.0: PTP failed to get time (JIRA:AlmaLinux-30110)


</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-08"/>
          <updated date="2024-05-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2250843" id="2250843"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270836" id="2270836"></bugzilla>
          <cve public="20230928" href="https://www.redhat.com/security/data/cve/CVE-2023-5090.html" impact="Moderate" cwe="CWE-755" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2023-5090</cve>
          <cve public="20230925" href="https://www.redhat.com/security/data/cve/CVE-2023-6240.html" impact="Moderate" cwe="CWE-203" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N">CVE-2023-6240</cve>
          <cve public="20240405" href="https://www.redhat.com/security/data/cve/CVE-2024-25742.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2024-25742</cve>
          <cve public="20240405" href="https://www.redhat.com/security/data/cve/CVE-2024-25743.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2024-25743</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758001" comment="bpftool is earlier than 0:7.3.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758002" comment="kernel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758003" comment="kernel-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758004" comment="kernel-debug is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758005" comment="kernel-debug-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758012" comment="kernel-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758014" comment="kernel-headers is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758015" comment="kernel-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758016" comment="kernel-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758018" comment="kernel-tools is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758021" comment="perf is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758022" comment="python3-perf is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758023" comment="rtla is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758024" comment="rv is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758032" comment="kernel-rt is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758033" comment="kernel-rt-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758044" comment="kernel-64k is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758045" comment="kernel-64k-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758060" comment="libperf is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242758062" comment="kernel-doc is earlier than 0:5.14.0-427.16.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20240977" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:0977: unbound security update (Important)</title>
        <reference ref_id="RHSA-2024:0977" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:0977"/>
        <reference ref_id="CVE-2023-50387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50387"/>
        <reference ref_id="CVE-2023-50868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50868"/>
        <reference ref_id="ALSA-2024:0977" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-0977.html"/>
        <description>The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. 

Security Fix(es):

* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-02-26"/>
          <updated date="2024-02-26"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263914" id="2263914"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263917" id="2263917"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50387" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50387</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50868" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50868</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240977001" comment="python3-unbound is earlier than 0:1.16.2-3.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062002" comment="python3-unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240977003" comment="unbound is earlier than 0:1.16.2-3.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062004" comment="unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240977008" comment="unbound-devel is earlier than 0:1.16.2-3.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062006" comment="unbound-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240977009" comment="unbound-libs is earlier than 0:1.16.2-3.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062008" comment="unbound-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241075" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1075: edk2 security update (Important)</title>
        <reference ref_id="RHSA-2024:1075" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1075"/>
        <reference ref_id="CVE-2023-45230" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45230"/>
        <reference ref_id="CVE-2023-45234" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45234"/>
        <reference ref_id="ALSA-2024:1075" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1075.html"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* edk2: Buffer overflow in the DHCPv6 client via a long Server ID option (CVE-2023-45230)
* edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message (CVE-2023-45234)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2258685" id="2258685"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258697" id="2258697"></bugzilla>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45230" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-45230</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45234" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-45234</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241075008" comment="edk2-tools is earlier than 0:20230524-4.el9_3.2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165006" comment="edk2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241075009" comment="edk2-aarch64 is earlier than 0:20230524-4.el9_3.2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165002" comment="edk2-aarch64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241075010" comment="edk2-ovmf is earlier than 0:20230524-4.el9_3.2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165004" comment="edk2-ovmf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241075011" comment="edk2-tools-doc is earlier than 0:20230524-4.el9_3.2.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165008" comment="edk2-tools-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241129" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1129: curl security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1129" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1129"/>
        <reference ref_id="CVE-2023-46218" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-46218"/>
        <reference ref_id="ALSA-2024:1129" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1129.html"/>
        <description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.

Security Fix(es):

* curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2252030" id="2252030"></bugzilla>
          <cve public="20231206" href="https://access.redhat.com/security/cve/CVE-2023-46218" impact="Moderate" cwe="CWE-201" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-46218</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241129001" comment="curl is earlier than 0:7.76.1-26.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245002" comment="curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241129003" comment="curl-minimal is earlier than 0:7.76.1-26.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245004" comment="curl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241129010" comment="libcurl is earlier than 0:7.76.1-26.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245006" comment="libcurl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241129011" comment="libcurl-devel is earlier than 0:7.76.1-26.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245008" comment="libcurl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241129012" comment="libcurl-minimal is earlier than 0:7.76.1-26.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225245010" comment="libcurl-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241130" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1130: openssh security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1130" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1130"/>
        <reference ref_id="CVE-2023-48795" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-48795"/>
        <reference ref_id="CVE-2023-51385" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-51385"/>
        <reference ref_id="ALSA-2024:1130" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1130.html"/>
        <description>OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)
* openssh: potential command injection via shell metacharacters (CVE-2023-51385)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2254210" id="2254210"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2255271" id="2255271"></bugzilla>
          <cve public="20231218" href="https://access.redhat.com/security/cve/CVE-2023-48795" impact="Moderate" cwe="CWE-222" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-48795</cve>
          <cve public="20231218" href="https://access.redhat.com/security/cve/CVE-2023-51385" impact="Moderate" cwe="CWE-78" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2023-51385</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241130001" comment="openssh is earlier than 0:8.7p1-34.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645002" comment="openssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241130003" comment="openssh-askpass is earlier than 0:8.7p1-34.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645004" comment="openssh-askpass is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241130005" comment="openssh-clients is earlier than 0:8.7p1-34.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645006" comment="openssh-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241130007" comment="openssh-keycat is earlier than 0:8.7p1-34.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645008" comment="openssh-keycat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241130009" comment="openssh-server is earlier than 0:8.7p1-34.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645010" comment="openssh-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241130011" comment="pam_ssh_agent_auth is earlier than 0:0.10.4-5.34.el9_3.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645012" comment="pam_ssh_agent_auth is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241131" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1131: golang security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1131" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1131"/>
        <reference ref_id="CVE-2023-39326" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39326"/>
        <reference ref_id="CVE-2023-45285" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45285"/>
        <reference ref_id="ALSA-2024:1131" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1131.html"/>
        <description>The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
* golang: cmd/go: Protocol Fallback when fetching modules (CVE-2023-45285)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2253323" id="2253323"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253330" id="2253330"></bugzilla>
          <cve public="20231206" href="https://access.redhat.com/security/cve/CVE-2023-39326" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-39326</cve>
          <cve public="20231206" href="https://access.redhat.com/security/cve/CVE-2023-45285" impact="Moderate" cwe="CWE-693" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45285</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131014" comment="go-toolset is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131003" comment="golang is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131005" comment="golang-bin is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131007" comment="golang-docs is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131009" comment="golang-misc is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131011" comment="golang-src is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241131013" comment="golang-tests is earlier than 0:1.20.12-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241134" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:1134: tomcat security update (Important)</title>
        <reference ref_id="RHSA-2024:1134" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1134"/>
        <reference ref_id="CVE-2023-46589" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-46589"/>
        <reference ref_id="ALSA-2024:1134" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1134.html"/>
        <description>Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Security Fix(es):

* tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2252050" id="2252050"></bugzilla>
          <cve public="20231128" href="https://access.redhat.com/security/cve/CVE-2023-46589" impact="Important" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-46589</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134001" comment="tomcat is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929002" comment="tomcat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134003" comment="tomcat-admin-webapps is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929004" comment="tomcat-admin-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134005" comment="tomcat-docs-webapp is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929006" comment="tomcat-docs-webapp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134007" comment="tomcat-el-3.0-api is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929008" comment="tomcat-el-3.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134009" comment="tomcat-jsp-2.3-api is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929010" comment="tomcat-jsp-2.3-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134011" comment="tomcat-lib is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929012" comment="tomcat-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134013" comment="tomcat-servlet-4.0-api is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929014" comment="tomcat-servlet-4.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241134015" comment="tomcat-webapps is earlier than 1:9.0.62-37.el9_3.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929016" comment="tomcat-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241139" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1139: keylime security update (Low)</title>
        <reference ref_id="RHSA-2024:1139" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1139"/>
        <reference ref_id="CVE-2023-3674" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3674"/>
        <reference ref_id="ALSA-2024:1139" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1139.html"/>
        <description>Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.

Security Fix(es):

* keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222903" id="2222903"></bugzilla>
          <cve public="20230712" href="https://access.redhat.com/security/cve/CVE-2023-3674" impact="Low" cwe="CWE-1283" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N">CVE-2023-3674</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139001" comment="keylime is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444002" comment="keylime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139003" comment="keylime-base is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444004" comment="keylime-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139005" comment="keylime-registrar is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444006" comment="keylime-registrar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139009" comment="keylime-tenant is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444010" comment="keylime-tenant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139011" comment="keylime-verifier is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444012" comment="keylime-verifier is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139013" comment="python3-keylime is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444014" comment="python3-keylime is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241139007" comment="keylime-selinux is earlier than 0:7.3.0-13.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228444008" comment="keylime-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241141" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1141: mysql security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1141" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1141"/>
        <reference ref_id="CVE-2022-4899" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-4899"/>
        <reference ref_id="CVE-2023-21911" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21911"/>
        <reference ref_id="CVE-2023-21919" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21919"/>
        <reference ref_id="CVE-2023-21920" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21920"/>
        <reference ref_id="CVE-2023-21929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21929"/>
        <reference ref_id="CVE-2023-21933" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21933"/>
        <reference ref_id="CVE-2023-21935" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21935"/>
        <reference ref_id="CVE-2023-21940" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21940"/>
        <reference ref_id="CVE-2023-21945" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21945"/>
        <reference ref_id="CVE-2023-21946" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21946"/>
        <reference ref_id="CVE-2023-21947" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21947"/>
        <reference ref_id="CVE-2023-21953" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21953"/>
        <reference ref_id="CVE-2023-21955" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21955"/>
        <reference ref_id="CVE-2023-21962" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21962"/>
        <reference ref_id="CVE-2023-21966" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21966"/>
        <reference ref_id="CVE-2023-21972" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21972"/>
        <reference ref_id="CVE-2023-21976" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21976"/>
        <reference ref_id="CVE-2023-21977" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21977"/>
        <reference ref_id="CVE-2023-21980" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21980"/>
        <reference ref_id="CVE-2023-21982" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-21982"/>
        <reference ref_id="CVE-2023-22005" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22005"/>
        <reference ref_id="CVE-2023-22007" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22007"/>
        <reference ref_id="CVE-2023-22008" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22008"/>
        <reference ref_id="CVE-2023-22032" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22032"/>
        <reference ref_id="CVE-2023-22033" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22033"/>
        <reference ref_id="CVE-2023-22038" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22038"/>
        <reference ref_id="CVE-2023-22046" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22046"/>
        <reference ref_id="CVE-2023-22048" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22048"/>
        <reference ref_id="CVE-2023-22053" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22053"/>
        <reference ref_id="CVE-2023-22054" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22054"/>
        <reference ref_id="CVE-2023-22056" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22056"/>
        <reference ref_id="CVE-2023-22057" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22057"/>
        <reference ref_id="CVE-2023-22058" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22058"/>
        <reference ref_id="CVE-2023-22059" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22059"/>
        <reference ref_id="CVE-2023-22064" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22064"/>
        <reference ref_id="CVE-2023-22065" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22065"/>
        <reference ref_id="CVE-2023-22066" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22066"/>
        <reference ref_id="CVE-2023-22068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22068"/>
        <reference ref_id="CVE-2023-22070" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22070"/>
        <reference ref_id="CVE-2023-22078" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22078"/>
        <reference ref_id="CVE-2023-22079" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22079"/>
        <reference ref_id="CVE-2023-22084" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22084"/>
        <reference ref_id="CVE-2023-22092" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22092"/>
        <reference ref_id="CVE-2023-22097" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22097"/>
        <reference ref_id="CVE-2023-22103" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22103"/>
        <reference ref_id="CVE-2023-22104" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22104"/>
        <reference ref_id="CVE-2023-22110" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22110"/>
        <reference ref_id="CVE-2023-22111" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22111"/>
        <reference ref_id="CVE-2023-22112" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22112"/>
        <reference ref_id="CVE-2023-22113" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22113"/>
        <reference ref_id="CVE-2023-22114" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22114"/>
        <reference ref_id="CVE-2023-22115" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-22115"/>
        <reference ref_id="CVE-2024-20960" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20960"/>
        <reference ref_id="CVE-2024-20961" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20961"/>
        <reference ref_id="CVE-2024-20962" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20962"/>
        <reference ref_id="CVE-2024-20963" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20963"/>
        <reference ref_id="CVE-2024-20964" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20964"/>
        <reference ref_id="CVE-2024-20965" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20965"/>
        <reference ref_id="CVE-2024-20966" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20966"/>
        <reference ref_id="CVE-2024-20967" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20967"/>
        <reference ref_id="CVE-2024-20968" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20968"/>
        <reference ref_id="CVE-2024-20969" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20969"/>
        <reference ref_id="CVE-2024-20970" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20970"/>
        <reference ref_id="CVE-2024-20971" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20971"/>
        <reference ref_id="CVE-2024-20972" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20972"/>
        <reference ref_id="CVE-2024-20973" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20973"/>
        <reference ref_id="CVE-2024-20974" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20974"/>
        <reference ref_id="CVE-2024-20976" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20976"/>
        <reference ref_id="CVE-2024-20977" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20977"/>
        <reference ref_id="CVE-2024-20978" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20978"/>
        <reference ref_id="CVE-2024-20981" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20981"/>
        <reference ref_id="CVE-2024-20982" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20982"/>
        <reference ref_id="CVE-2024-20983" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20983"/>
        <reference ref_id="CVE-2024-20984" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20984"/>
        <reference ref_id="CVE-2024-20985" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-20985"/>
        <reference ref_id="ALSA-2024:1141" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1141.html"/>
        <description>MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.

Security Fix(es):

* mysql: InnoDB unspecified vulnerability (CPU Apr 2023) (CVE-2023-21911)
* mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) (CVE-2023-21919, CVE-2023-21929, CVE-2023-21933)
* mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) (CVE-2023-21920, CVE-2023-21935, CVE-2023-21945, CVE-2023-21946, CVE-2023-21976, CVE-2023-21977, CVE-2023-21982)
* mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) (CVE-2023-21940, CVE-2023-21947, CVE-2023-21962)
* mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) (CVE-2023-21953)
* mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) (CVE-2023-21955)
* mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) (CVE-2023-21966)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2023) (CVE-2023-21972)
* mysql: Client programs unspecified vulnerability (CPU Apr 2023) (CVE-2023-21980)
* mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) (CVE-2023-22005, CVE-2023-22007, CVE-2023-22057)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2023) (CVE-2023-22008)
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) (CVE-2023-22032, CVE-2023-22059, CVE-2023-22064, CVE-2023-22065, CVE-2023-22070, CVE-2023-22078, CVE-2023-22079, CVE-2023-22092, CVE-2023-22103, CVE-2023-22110, CVE-2023-22112)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2023) (CVE-2023-22033)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) (CVE-2023-22046)
* mysql: Client programs unspecified vulnerability (CPU Jul 2023) (CVE-2023-22053, CVE-2023-22054, CVE-2023-22056)
* mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) (CVE-2023-22058)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2023) (CVE-2023-22066, CVE-2023-22068, CVE-2023-22084, CVE-2023-22097, CVE-2023-22104, CVE-2023-22114)
* mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) (CVE-2023-22111)
* mysql: Server: DML unspecified vulnerability (CPU Oct 2023) (CVE-2023-22115)
* mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) (CVE-2024-20960)
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) (CVE-2024-20961, CVE-2024-20962, CVE-2024-20965, CVE-2024-20966, CVE-2024-2097, CVE-2024-20971, CVE-2024-20972, CVE-2024-20973, CVE-2024-20974, CVE-2024-20976, CVE-2024-20977, CVE-2024-20978, CVE-2024-20982)
* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) (CVE-2024-20963)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) (CVE-2024-20964)
* mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) (CVE-2024-20967)
* mysql: Server: Options unspecified vulnerability (CPU Jan 2024) (CVE-2024-20968)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) (CVE-2024-20969)
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) (CVE-2024-20981)
* mysql: Server: DML unspecified vulnerability (CPU Jan 2024) (CVE-2024-20983)
* mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) (CVE-2024-20984)
* mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) (CVE-2024-20985)
* zstd: mysql: buffer overrun in util.c (CVE-2022-4899)
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) (CVE-2023-22038)
* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) (CVE-2023-22048)
* mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) (CVE-2023-22113)

Bug Fix(es):

* Fix for MySQL bug #33630199 in 8.0.32 introduces regression when --set-gtid-purged=OFF (AlmaLinux-22454)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-05"/>
          <updated date="2024-03-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2179864" id="2179864"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188109" id="2188109"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188113" id="2188113"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188115" id="2188115"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188116" id="2188116"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188117" id="2188117"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188118" id="2188118"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188119" id="2188119"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188120" id="2188120"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188121" id="2188121"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188122" id="2188122"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188123" id="2188123"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188124" id="2188124"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188125" id="2188125"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188127" id="2188127"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188128" id="2188128"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188129" id="2188129"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188130" id="2188130"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188131" id="2188131"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2188132" id="2188132"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224211" id="2224211"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224212" id="2224212"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224213" id="2224213"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224214" id="2224214"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224215" id="2224215"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224216" id="2224216"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224217" id="2224217"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224218" id="2224218"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224219" id="2224219"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224220" id="2224220"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224221" id="2224221"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224222" id="2224222"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245014" id="2245014"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245015" id="2245015"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245016" id="2245016"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245017" id="2245017"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245018" id="2245018"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245019" id="2245019"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245020" id="2245020"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245021" id="2245021"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245022" id="2245022"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245023" id="2245023"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245024" id="2245024"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245026" id="2245026"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245027" id="2245027"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245028" id="2245028"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245029" id="2245029"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245030" id="2245030"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245031" id="2245031"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245032" id="2245032"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245033" id="2245033"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2245034" id="2245034"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258771" id="2258771"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258772" id="2258772"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258773" id="2258773"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258774" id="2258774"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258775" id="2258775"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258776" id="2258776"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258777" id="2258777"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258778" id="2258778"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258779" id="2258779"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258780" id="2258780"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258781" id="2258781"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258782" id="2258782"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258783" id="2258783"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258784" id="2258784"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258785" id="2258785"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258787" id="2258787"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258788" id="2258788"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258789" id="2258789"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258790" id="2258790"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258791" id="2258791"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258792" id="2258792"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258793" id="2258793"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258794" id="2258794"></bugzilla>
          <cve public="20220717" href="https://access.redhat.com/security/cve/CVE-2022-4899" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-4899</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21911" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21911</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21919" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21919</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21920" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21920</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21929" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2023-21929</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21933" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21933</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21935" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21935</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21940" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21940</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21945" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21945</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21946" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21946</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21947" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21947</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21953" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21953</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21955" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21955</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21962" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21962</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21966" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21966</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21972" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21972</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21976" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21976</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21977" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21977</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21980" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2023-21980</cve>
          <cve public="20230418" href="https://access.redhat.com/security/cve/CVE-2023-21982" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-21982</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22005" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22005</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22007" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22007</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22008" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22008</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22032" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22032</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22033" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22033</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22038" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N">CVE-2023-22038</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22046" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22046</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22048" impact="Low" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2023-22048</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22053" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H">CVE-2023-22053</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22054" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22054</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22056" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22056</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22057" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22057</cve>
          <cve public="20230718" href="https://access.redhat.com/security/cve/CVE-2023-22058" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22058</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22059" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22059</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22064" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22064</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22065" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22065</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22066" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22066</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22068" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22068</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22070" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22070</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22078" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22078</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22079" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22079</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22084" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22084</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22092" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22092</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22097" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22097</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22103" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22103</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22104" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22104</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22110" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22110</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22111" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22111</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22112" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22112</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22113" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N">CVE-2023-22113</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22114" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22114</cve>
          <cve public="20231017" href="https://access.redhat.com/security/cve/CVE-2023-22115" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-22115</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20960" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20960</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20961" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20961</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20962" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20962</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20963" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20963</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20964" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20964</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20965" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20965</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20966" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20966</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20967" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2024-20967</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20968" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20968</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20969" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H">CVE-2024-20969</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20970" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20970</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20971" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20971</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20972" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20972</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20973" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20973</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20974" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20974</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20976" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20976</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20977" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20977</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20978" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20978</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20981" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20981</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20982" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20982</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20983" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20983</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20984" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20984</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-20985" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-20985</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141001" comment="mysql is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590002" comment="mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141003" comment="mysql-common is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590004" comment="mysql-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141005" comment="mysql-devel is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590006" comment="mysql-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141007" comment="mysql-errmsg is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590008" comment="mysql-errmsg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141009" comment="mysql-libs is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590010" comment="mysql-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141011" comment="mysql-server is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590012" comment="mysql-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241141013" comment="mysql-test is earlier than 0:8.0.36-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226590014" comment="mysql-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243306" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:3306: kernel security and bug fix update (Moderate)</title>
        <reference ref_id="CVE-2024-26642" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26642.html"/>
        <reference ref_id="CVE-2024-26643" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26643.html"/>
        <reference ref_id="CVE-2024-26673" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26673.html"/>
        <reference ref_id="CVE-2024-26804" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-26804.html"/>
        <reference ref_id="CVE-2024-35890" source="CVE" ref_url="https://www.redhat.com/security/data/cve/CVE-2024-35890.html"/>
        <reference ref_id="RHSA-2024:3306" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3306"/>
        <reference ref_id="ALSA-2024:3306" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3306.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643)
  * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642)
  * kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations (CVE-2024-26673)
  * kernel: net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)


</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-23"/>
          <updated date="2024-05-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2270879" id="2270879"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270881" id="2270881"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2272816" id="2272816"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273423" id="2273423"></bugzilla>
          <cve public="20240321" href="https://www.redhat.com/security/data/cve/CVE-2024-26642.html" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26642</cve>
          <cve public="20240321" href="https://www.redhat.com/security/data/cve/CVE-2024-26643.html" impact="Low" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26643</cve>
          <cve public="20240402" href="https://www.redhat.com/security/data/cve/CVE-2024-26673.html" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H">CVE-2024-26673</cve>
          <cve public="20240404" href="https://www.redhat.com/security/data/cve/CVE-2024-26804.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26804</cve>
          <cve public="20240519" href="https://www.redhat.com/security/data/cve/CVE-2024-35890.html" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35890</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306001" comment="bpftool is earlier than 0:7.3.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306002" comment="kernel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306003" comment="kernel-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306004" comment="kernel-debug is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306005" comment="kernel-debug-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306012" comment="kernel-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306014" comment="kernel-headers is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306015" comment="kernel-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306016" comment="kernel-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306018" comment="kernel-tools is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306021" comment="perf is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306022" comment="python3-perf is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306023" comment="rtla is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306024" comment="rv is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306032" comment="kernel-rt is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306033" comment="kernel-rt-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306044" comment="kernel-64k is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306045" comment="kernel-64k-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306060" comment="libperf is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243306062" comment="kernel-doc is earlier than 0:5.14.0-427.18.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241239" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1239: opencryptoki security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1239" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1239"/>
        <reference ref_id="CVE-2024-0914" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0914"/>
        <reference ref_id="ALSA-2024:1239" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1239.html"/>
        <description>The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.

Security Fix(es):

* opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-07"/>
          <updated date="2024-03-07"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2260407" id="2260407"></bugzilla>
          <cve public="20240125" href="https://access.redhat.com/security/cve/CVE-2024-0914" impact="Moderate" cwe="CWE-385-&gt;CWE-208-&gt;CWE-203" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2024-0914</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239017" comment="opencryptoki is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239002" comment="opencryptoki is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239018" comment="opencryptoki-ccatok is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239004" comment="opencryptoki-ccatok is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239019" comment="opencryptoki-devel is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239006" comment="opencryptoki-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239020" comment="opencryptoki-ep11tok is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239008" comment="opencryptoki-ep11tok is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239021" comment="opencryptoki-icatok is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239010" comment="opencryptoki-icatok is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239022" comment="opencryptoki-icsftok is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239012" comment="opencryptoki-icsftok is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239023" comment="opencryptoki-libs is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239014" comment="opencryptoki-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239024" comment="opencryptoki-swtok is earlier than 0:3.21.0-9.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241239016" comment="opencryptoki-swtok is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243619" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:3619: kernel security and bug fix update (Moderate)</title>
        <reference ref_id="CVE-2024-26735" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26735"/>
        <reference ref_id="CVE-2024-26993" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26993"/>
        <reference ref_id="RHSA-2024:3619" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3619"/>
        <reference ref_id="ALSA-2024:3619" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3619.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
  * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-05"/>
          <updated date="2024-06-05"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2273278" id="2273278"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278314" id="2278314"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-26735" impact="Moderate" cwe="CWE-416-&gt;CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26735</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26993" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26993</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619001" comment="bpftool is earlier than 0:7.3.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619002" comment="kernel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619003" comment="kernel-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619004" comment="kernel-debug is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619005" comment="kernel-debug-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619012" comment="kernel-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619014" comment="kernel-headers is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619015" comment="kernel-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619016" comment="kernel-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619018" comment="kernel-tools is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619021" comment="perf is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619022" comment="python3-perf is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619023" comment="rtla is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619024" comment="rv is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619032" comment="kernel-rt is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619033" comment="kernel-rt-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619044" comment="kernel-64k is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619045" comment="kernel-64k-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619060" comment="libperf is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243619062" comment="kernel-doc is earlier than 0:5.14.0-427.20.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241309" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:1309: .NET 7.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1309" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1309"/>
        <reference ref_id="CVE-2024-21392" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21392"/>
        <reference ref_id="ALSA-2024:1309" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1309.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.117 and .NET Runtime 7.0.17.

Security Fix(es):

* dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (CVE-2024-21392)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-13"/>
          <updated date="2024-03-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268266" id="2268266"></bugzilla>
          <cve public="20240312" href="https://access.redhat.com/security/cve/CVE-2024-21392" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21392</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.17-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.17-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.17-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309007" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.17-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309009" comment="dotnet-runtime-7.0 is earlier than 0:7.0.17-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309011" comment="dotnet-sdk-7.0 is earlier than 0:7.0.117-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309013" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.117-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309015" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.17-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241309017" comment="dotnet-templates-7.0 is earlier than 0:7.0.117-1.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241310" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:1310: .NET 8.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1310" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1310"/>
        <reference ref_id="CVE-2024-21392" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21392"/>
        <reference ref_id="ALSA-2024:1310" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1310.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.103 and .NET Runtime 8.0.3.

Security Fix(es):

* dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (CVE-2024-21392)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-13"/>
          <updated date="2024-03-13"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268266" id="2268266"></bugzilla>
          <cve public="20240312" href="https://access.redhat.com/security/cve/CVE-2024-21392" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-21392</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310028" comment="aspnetcore-runtime-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253002" comment="aspnetcore-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310003" comment="aspnetcore-runtime-dbg-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848004" comment="aspnetcore-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310029" comment="aspnetcore-targeting-pack-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253004" comment="aspnetcore-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310030" comment="dotnet-apphost-pack-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253006" comment="dotnet-apphost-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310009" comment="dotnet-host is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310031" comment="dotnet-hostfxr-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253010" comment="dotnet-hostfxr-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310032" comment="dotnet-runtime-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253012" comment="dotnet-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310015" comment="dotnet-runtime-dbg-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848016" comment="dotnet-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310033" comment="dotnet-sdk-8.0 is earlier than 0:8.0.103-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253014" comment="dotnet-sdk-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310034" comment="dotnet-sdk-8.0-source-built-artifacts is earlier than 0:8.0.103-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253016" comment="dotnet-sdk-8.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310021" comment="dotnet-sdk-dbg-8.0 is earlier than 0:8.0.103-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848022" comment="dotnet-sdk-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310035" comment="dotnet-targeting-pack-8.0 is earlier than 0:8.0.3-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253018" comment="dotnet-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310036" comment="dotnet-templates-8.0 is earlier than 0:8.0.103-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253020" comment="dotnet-templates-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241310027" comment="netstandard-targeting-pack-2.1 is earlier than 0:8.0.103-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244349" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4349: kernel security and bug fix update (Moderate)</title>
        <reference ref_id="CVE-2021-47400" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47400"/>
        <reference ref_id="CVE-2023-52626" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52626"/>
        <reference ref_id="CVE-2023-52667" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52667"/>
        <reference ref_id="CVE-2024-26801" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26801"/>
        <reference ref_id="CVE-2024-26974" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26974"/>
        <reference ref_id="CVE-2024-27393" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27393"/>
        <reference ref_id="CVE-2024-35870" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35870"/>
        <reference ref_id="CVE-2024-35960" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35960"/>
        <reference ref_id="RHSA-2024:4349" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4349"/>
        <reference ref_id="ALSA-2024:4349" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4349.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626)
  * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801)
  * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)
  * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393)
  * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)
  * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870)
  * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)
  * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400)


Bug Fix(es):  

  * cifs - kernel panic with cifs_put_smb_ses (JIRA:AlmaLinux-28943)
  * BUG: unable to handle page fault for address: ff16bf752f593ff8 [almalinux-9.4.z] (JIRA:AlmaLinux-35672)
  * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [almalinux-9.4.z] (JIRA:AlmaLinux-36220)
  * [AlmaLinux9] kernel BUG at lib/list_debug.c:51! [almalinux-9.4.z] (JIRA:AlmaLinux-36687)
  * ice: DPLL-related fixes [almalinux-9.4.z] (JIRA:AlmaLinux-36716)
  * CNB95: net/sched: update TC core to upstream v6.8 [almalinux-9.4.z] (JIRA:AlmaLinux-37641)
  * IPv6: SR: backport fixes from upstream [almalinux-9.4.z] (JIRA:AlmaLinux-37669)
  * [RFE] Backport tmpfs noswap mount option [almalinux-9.4.z] (JIRA:AlmaLinux-38252)
  * Isolated cores causing issues on latest AlmaLinux9.4 kernel and not functioning as desired. [almalinux-9.4.z] (JIRA:AlmaLinux-38595)
  * [ice] Add automatic VF reset on Tx MDD events [almalinux-9.4.z] (JIRA:AlmaLinux-39083)
  * [HPEMC AlmaLinux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [almalinux-9.4.z] (JIRA:AlmaLinux-34953)
  * bnx2x: fix crashes in PCI error handling, resource leaks [almalinux-9.4.z] (JIRA:AlmaLinux-43272)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-08"/>
          <updated date="2024-07-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2271680" id="2271680"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273429" id="2273429"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278354" id="2278354"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280745" id="2280745"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281350" id="2281350"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281740" id="2281740"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281920" id="2281920"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282336" id="2282336"></bugzilla>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2021-47400" impact="Moderate" cwe="CWE-664" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2021-47400</cve>
          <cve public="20240326" href="https://access.redhat.com/security/cve/CVE-2023-52626" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H">CVE-2023-52626</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2023-52667" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52667</cve>
          <cve public="20240404" href="https://access.redhat.com/security/cve/CVE-2024-26801" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26801</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26974" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-26974</cve>
          <cve public="20240508" href="https://access.redhat.com/security/cve/CVE-2024-27393" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27393</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35870" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-35870</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-35960" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35960</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349001" comment="bpftool is earlier than 0:7.3.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349002" comment="kernel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349003" comment="kernel-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349004" comment="kernel-debug is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349005" comment="kernel-debug-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349012" comment="kernel-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349014" comment="kernel-headers is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349015" comment="kernel-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349016" comment="kernel-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349018" comment="kernel-tools is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349021" comment="perf is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349022" comment="python3-perf is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349023" comment="rtla is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349024" comment="rv is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349032" comment="kernel-rt is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349033" comment="kernel-rt-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349044" comment="kernel-64k is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349045" comment="kernel-64k-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349060" comment="libperf is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244349062" comment="kernel-doc is earlier than 0:5.14.0-427.24.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241334" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1334: dnsmasq security update (Important)</title>
        <reference ref_id="RHSA-2024:1334" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1334"/>
        <reference ref_id="CVE-2023-50387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50387"/>
        <reference ref_id="CVE-2023-50868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50868"/>
        <reference ref_id="ALSA-2024:1334" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1334.html"/>
        <description>The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.

Security Fix(es):

* dnsmasq: bind9: KeyTrap - Extreme CPU consumption in DNSSEC
validator (CVE-2023-50387)
* dnsmasq: bind9: Preparing an NSEC3 closest encloser proof can
exhaust CPU resources (CVE-2023-50868)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-14"/>
          <updated date="2024-03-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263914" id="2263914"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263917" id="2263917"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50387" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50387</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50868" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50868</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241334001" comment="dnsmasq is earlier than 0:2.85-14.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070002" comment="dnsmasq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241334003" comment="dnsmasq-utils is earlier than 0:2.85-14.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228070004" comment="dnsmasq-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241427" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:1427: libreoffice security update (Important)</title>
        <reference ref_id="RHSA-2024:1427" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1427"/>
        <reference ref_id="CVE-2023-6185" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6185"/>
        <reference ref_id="CVE-2023-6186" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6186"/>
        <reference ref_id="ALSA-2024:1427" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1427.html"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

Security Fix(es):

* CVE-2023-6186 libreoffice: various flaws (JIRA:AlmaLinux-20657)
* CVE-2023-6185 libreoffice: various flaws (JIRA:AlmaLinux-20657)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-19"/>
          <updated date="2024-03-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2254003" id="2254003"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254005" id="2254005"></bugzilla>
          <cve public="20231211" href="https://access.redhat.com/security/cve/CVE-2023-6185" impact="Important" cwe="CWE-250" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H">CVE-2023-6185</cve>
          <cve public="20231211" href="https://access.redhat.com/security/cve/CVE-2023-6186" impact="Important" cwe="CWE-250" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H">CVE-2023-6186</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427358" comment="libreoffice is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755359" comment="libreoffice is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427359" comment="libreoffice-base is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755361" comment="libreoffice-base is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427360" comment="libreoffice-calc is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755363" comment="libreoffice-calc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427361" comment="libreoffice-core is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755365" comment="libreoffice-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427362" comment="libreoffice-draw is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755367" comment="libreoffice-draw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427363" comment="libreoffice-emailmerge is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755369" comment="libreoffice-emailmerge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427364" comment="libreoffice-filters is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755371" comment="libreoffice-filters is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427365" comment="libreoffice-gdb-debug-support is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755373" comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427366" comment="libreoffice-graphicfilter is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755375" comment="libreoffice-graphicfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427367" comment="libreoffice-gtk3 is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755377" comment="libreoffice-gtk3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427368" comment="libreoffice-help-ar is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755379" comment="libreoffice-help-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427369" comment="libreoffice-help-bg is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755381" comment="libreoffice-help-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427370" comment="libreoffice-help-bn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755383" comment="libreoffice-help-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427371" comment="libreoffice-help-ca is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755385" comment="libreoffice-help-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427372" comment="libreoffice-help-cs is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755387" comment="libreoffice-help-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427373" comment="libreoffice-help-da is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755389" comment="libreoffice-help-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427374" comment="libreoffice-help-de is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755391" comment="libreoffice-help-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427375" comment="libreoffice-help-dz is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755393" comment="libreoffice-help-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427376" comment="libreoffice-help-el is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755395" comment="libreoffice-help-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427377" comment="libreoffice-help-en is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755397" comment="libreoffice-help-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427378" comment="libreoffice-help-eo is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755399" comment="libreoffice-help-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427379" comment="libreoffice-help-es is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755401" comment="libreoffice-help-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427380" comment="libreoffice-help-et is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755403" comment="libreoffice-help-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427381" comment="libreoffice-help-eu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755405" comment="libreoffice-help-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427382" comment="libreoffice-help-fi is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755407" comment="libreoffice-help-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427383" comment="libreoffice-help-fr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755409" comment="libreoffice-help-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427384" comment="libreoffice-help-gl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755411" comment="libreoffice-help-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427385" comment="libreoffice-help-gu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755413" comment="libreoffice-help-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427386" comment="libreoffice-help-he is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755415" comment="libreoffice-help-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427387" comment="libreoffice-help-hi is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755417" comment="libreoffice-help-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427388" comment="libreoffice-help-hr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755419" comment="libreoffice-help-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427389" comment="libreoffice-help-hu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755421" comment="libreoffice-help-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427390" comment="libreoffice-help-id is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755423" comment="libreoffice-help-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427391" comment="libreoffice-help-it is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755425" comment="libreoffice-help-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427392" comment="libreoffice-help-ja is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755427" comment="libreoffice-help-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427393" comment="libreoffice-help-ko is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755429" comment="libreoffice-help-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427394" comment="libreoffice-help-lt is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755431" comment="libreoffice-help-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427395" comment="libreoffice-help-lv is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755433" comment="libreoffice-help-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427396" comment="libreoffice-help-nb is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755435" comment="libreoffice-help-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427397" comment="libreoffice-help-nl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755437" comment="libreoffice-help-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427398" comment="libreoffice-help-nn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755439" comment="libreoffice-help-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427399" comment="libreoffice-help-pl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755441" comment="libreoffice-help-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427400" comment="libreoffice-help-pt-BR is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755443" comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427401" comment="libreoffice-help-pt-PT is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755445" comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427402" comment="libreoffice-help-ro is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755447" comment="libreoffice-help-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427403" comment="libreoffice-help-ru is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755449" comment="libreoffice-help-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427404" comment="libreoffice-help-si is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755451" comment="libreoffice-help-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427405" comment="libreoffice-help-sk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755453" comment="libreoffice-help-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427406" comment="libreoffice-help-sl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755455" comment="libreoffice-help-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427407" comment="libreoffice-help-sv is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755457" comment="libreoffice-help-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427408" comment="libreoffice-help-ta is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755459" comment="libreoffice-help-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427409" comment="libreoffice-help-tr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755461" comment="libreoffice-help-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427410" comment="libreoffice-help-uk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755463" comment="libreoffice-help-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427411" comment="libreoffice-help-zh-Hans is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755465" comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427412" comment="libreoffice-help-zh-Hant is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755467" comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427413" comment="libreoffice-impress is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755469" comment="libreoffice-impress is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427414" comment="libreoffice-langpack-af is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755471" comment="libreoffice-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427415" comment="libreoffice-langpack-ar is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755473" comment="libreoffice-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427416" comment="libreoffice-langpack-as is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755475" comment="libreoffice-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427417" comment="libreoffice-langpack-bg is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755477" comment="libreoffice-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427418" comment="libreoffice-langpack-bn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755479" comment="libreoffice-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427419" comment="libreoffice-langpack-br is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755481" comment="libreoffice-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427420" comment="libreoffice-langpack-ca is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755483" comment="libreoffice-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427421" comment="libreoffice-langpack-cs is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755485" comment="libreoffice-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427422" comment="libreoffice-langpack-cy is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755487" comment="libreoffice-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427423" comment="libreoffice-langpack-da is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755489" comment="libreoffice-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427424" comment="libreoffice-langpack-de is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755491" comment="libreoffice-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427425" comment="libreoffice-langpack-dz is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755493" comment="libreoffice-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427426" comment="libreoffice-langpack-el is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755495" comment="libreoffice-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427427" comment="libreoffice-langpack-en is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755497" comment="libreoffice-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427428" comment="libreoffice-langpack-eo is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755499" comment="libreoffice-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427429" comment="libreoffice-langpack-es is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755501" comment="libreoffice-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427430" comment="libreoffice-langpack-et is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755503" comment="libreoffice-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427431" comment="libreoffice-langpack-eu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755505" comment="libreoffice-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427432" comment="libreoffice-langpack-fa is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755507" comment="libreoffice-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427433" comment="libreoffice-langpack-fi is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755509" comment="libreoffice-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427434" comment="libreoffice-langpack-fr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755511" comment="libreoffice-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427435" comment="libreoffice-langpack-fy is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755513" comment="libreoffice-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427436" comment="libreoffice-langpack-ga is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755515" comment="libreoffice-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427437" comment="libreoffice-langpack-gl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755517" comment="libreoffice-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427438" comment="libreoffice-langpack-gu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755519" comment="libreoffice-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427439" comment="libreoffice-langpack-he is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755521" comment="libreoffice-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427440" comment="libreoffice-langpack-hi is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755523" comment="libreoffice-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427441" comment="libreoffice-langpack-hr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755525" comment="libreoffice-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427442" comment="libreoffice-langpack-hu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755527" comment="libreoffice-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427443" comment="libreoffice-langpack-id is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755529" comment="libreoffice-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427444" comment="libreoffice-langpack-it is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755531" comment="libreoffice-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427445" comment="libreoffice-langpack-ja is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755533" comment="libreoffice-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427446" comment="libreoffice-langpack-kk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755535" comment="libreoffice-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427447" comment="libreoffice-langpack-kn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755537" comment="libreoffice-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427448" comment="libreoffice-langpack-ko is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755539" comment="libreoffice-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427449" comment="libreoffice-langpack-lt is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755541" comment="libreoffice-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427450" comment="libreoffice-langpack-lv is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755543" comment="libreoffice-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427451" comment="libreoffice-langpack-mai is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755545" comment="libreoffice-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427452" comment="libreoffice-langpack-ml is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755547" comment="libreoffice-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427453" comment="libreoffice-langpack-mr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755549" comment="libreoffice-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427454" comment="libreoffice-langpack-nb is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755551" comment="libreoffice-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427455" comment="libreoffice-langpack-nl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755553" comment="libreoffice-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427456" comment="libreoffice-langpack-nn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755555" comment="libreoffice-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427457" comment="libreoffice-langpack-nr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755557" comment="libreoffice-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427458" comment="libreoffice-langpack-nso is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755559" comment="libreoffice-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427459" comment="libreoffice-langpack-or is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755561" comment="libreoffice-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427460" comment="libreoffice-langpack-pa is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755563" comment="libreoffice-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427461" comment="libreoffice-langpack-pl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755565" comment="libreoffice-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427462" comment="libreoffice-langpack-pt-BR is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755567" comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427463" comment="libreoffice-langpack-pt-PT is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755569" comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427464" comment="libreoffice-langpack-ro is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755571" comment="libreoffice-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427465" comment="libreoffice-langpack-ru is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755573" comment="libreoffice-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427466" comment="libreoffice-langpack-si is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755575" comment="libreoffice-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427467" comment="libreoffice-langpack-sk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755577" comment="libreoffice-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427468" comment="libreoffice-langpack-sl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755579" comment="libreoffice-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427469" comment="libreoffice-langpack-sr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755581" comment="libreoffice-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427470" comment="libreoffice-langpack-ss is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755583" comment="libreoffice-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427471" comment="libreoffice-langpack-st is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755585" comment="libreoffice-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427472" comment="libreoffice-langpack-sv is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755587" comment="libreoffice-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427473" comment="libreoffice-langpack-ta is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755589" comment="libreoffice-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427474" comment="libreoffice-langpack-te is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755591" comment="libreoffice-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427475" comment="libreoffice-langpack-th is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755593" comment="libreoffice-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427476" comment="libreoffice-langpack-tn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755595" comment="libreoffice-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427477" comment="libreoffice-langpack-tr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755597" comment="libreoffice-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427478" comment="libreoffice-langpack-ts is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755599" comment="libreoffice-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427479" comment="libreoffice-langpack-uk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755601" comment="libreoffice-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427480" comment="libreoffice-langpack-ve is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755603" comment="libreoffice-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427481" comment="libreoffice-langpack-xh is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755605" comment="libreoffice-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427482" comment="libreoffice-langpack-zh-Hans is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755607" comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427483" comment="libreoffice-langpack-zh-Hant is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755609" comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427484" comment="libreoffice-langpack-zu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755611" comment="libreoffice-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427485" comment="libreoffice-math is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755613" comment="libreoffice-math is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427486" comment="libreoffice-ogltrans is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755615" comment="libreoffice-ogltrans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427487" comment="libreoffice-pdfimport is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755617" comment="libreoffice-pdfimport is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427488" comment="libreoffice-pyuno is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755619" comment="libreoffice-pyuno is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427489" comment="libreoffice-sdk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755621" comment="libreoffice-sdk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427490" comment="libreoffice-sdk-doc is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755623" comment="libreoffice-sdk-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427491" comment="libreoffice-ure is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755625" comment="libreoffice-ure is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427492" comment="libreoffice-wiki-publisher is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755627" comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427493" comment="libreoffice-writer is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755629" comment="libreoffice-writer is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427494" comment="libreoffice-x11 is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755631" comment="libreoffice-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427495" comment="libreoffice-xsltfilter is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755633" comment="libreoffice-xsltfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427496" comment="libreofficekit is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755635" comment="libreofficekit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427497" comment="autocorr-af is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755637" comment="autocorr-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427498" comment="autocorr-bg is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755639" comment="autocorr-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427499" comment="autocorr-ca is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755641" comment="autocorr-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427500" comment="autocorr-cs is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755643" comment="autocorr-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427501" comment="autocorr-da is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755645" comment="autocorr-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427502" comment="autocorr-de is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755647" comment="autocorr-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427503" comment="autocorr-dsb is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755649" comment="autocorr-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427504" comment="autocorr-el is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755651" comment="autocorr-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427505" comment="autocorr-en is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755653" comment="autocorr-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427506" comment="autocorr-es is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755655" comment="autocorr-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427507" comment="autocorr-fa is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755657" comment="autocorr-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427508" comment="autocorr-fi is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755659" comment="autocorr-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427509" comment="autocorr-fr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755661" comment="autocorr-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427510" comment="autocorr-ga is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755663" comment="autocorr-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427511" comment="autocorr-hr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755665" comment="autocorr-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427512" comment="autocorr-hsb is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755667" comment="autocorr-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427513" comment="autocorr-hu is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755669" comment="autocorr-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427514" comment="autocorr-is is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755671" comment="autocorr-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427515" comment="autocorr-it is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755673" comment="autocorr-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427516" comment="autocorr-ja is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755675" comment="autocorr-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427517" comment="autocorr-ko is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755677" comment="autocorr-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427518" comment="autocorr-lb is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755679" comment="autocorr-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427519" comment="autocorr-lt is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755681" comment="autocorr-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427520" comment="autocorr-mn is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755683" comment="autocorr-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427521" comment="autocorr-nl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755685" comment="autocorr-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427522" comment="autocorr-pl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755687" comment="autocorr-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427523" comment="autocorr-pt is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755689" comment="autocorr-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427524" comment="autocorr-ro is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755691" comment="autocorr-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427525" comment="autocorr-ru is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755693" comment="autocorr-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427526" comment="autocorr-sk is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755695" comment="autocorr-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427527" comment="autocorr-sl is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755697" comment="autocorr-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427528" comment="autocorr-sr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755699" comment="autocorr-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427529" comment="autocorr-sv is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755701" comment="autocorr-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427530" comment="autocorr-tr is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755703" comment="autocorr-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427531" comment="autocorr-vi is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755705" comment="autocorr-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427532" comment="autocorr-vro is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755707" comment="autocorr-vro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427533" comment="autocorr-zh is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755709" comment="autocorr-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427534" comment="libreoffice-data is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755711" comment="libreoffice-data is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427535" comment="libreoffice-opensymbol-fonts is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755713" comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241427536" comment="libreoffice-ure-common is earlier than 1:7.1.8.1-12.el9_3.alma"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755715" comment="libreoffice-ure-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244928" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4928: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2021-47459" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47459"/>
        <reference ref_id="CVE-2022-48743" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48743"/>
        <reference ref_id="CVE-2023-52458" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52458"/>
        <reference ref_id="CVE-2023-52809" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52809"/>
        <reference ref_id="CVE-2024-26737" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26737"/>
        <reference ref_id="CVE-2024-26773" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26773"/>
        <reference ref_id="CVE-2024-26852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26852"/>
        <reference ref_id="CVE-2024-26880" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26880"/>
        <reference ref_id="CVE-2024-26982" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26982"/>
        <reference ref_id="CVE-2024-27030" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27030"/>
        <reference ref_id="CVE-2024-27046" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27046"/>
        <reference ref_id="CVE-2024-35857" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35857"/>
        <reference ref_id="CVE-2024-35885" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35885"/>
        <reference ref_id="CVE-2024-35907" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35907"/>
        <reference ref_id="CVE-2024-36924" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36924"/>
        <reference ref_id="CVE-2024-36952" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36952"/>
        <reference ref_id="CVE-2024-38580" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38580"/>
        <reference ref_id="RHSA-2024:4928" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4928"/>
        <reference ref_id="ALSA-2024:4928" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4928.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458)
  * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
  * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737)
  * kernel: dm: call the resume method on internal suspend (CVE-2024-26880)
  * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852)
  * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
  * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046)
  * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030)
  * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857)
  * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907)
  * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885)
  * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809)
  * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459)
  * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924)
  * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952)
  * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743)
  * kernel: epoll: be better about file lifetimes (CVE-2024-38580)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-31"/>
          <updated date="2024-07-31"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265794" id="2265794"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273236" id="2273236"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273274" id="2273274"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275690" id="2275690"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275761" id="2275761"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278337" id="2278337"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278435" id="2278435"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278473" id="2278473"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281247" id="2281247"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281647" id="2281647"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281700" id="2281700"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282669" id="2282669"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282898" id="2282898"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284506" id="2284506"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284598" id="2284598"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293316" id="2293316"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293412" id="2293412"></bugzilla>
          <cve public="20240522" href="https://access.redhat.com/security/cve/CVE-2021-47459" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-47459</cve>
          <cve public="20240620" href="https://access.redhat.com/security/cve/CVE-2022-48743" impact="Low" cwe="CWE-124" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2022-48743</cve>
          <cve public="20240223" href="https://access.redhat.com/security/cve/CVE-2023-52458" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H">CVE-2023-52458</cve>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2023-52809" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52809</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-26737" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26737</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-26773" impact="Moderate" cwe="CWE-229" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26773</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26852" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-26852</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26880" impact="Moderate" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26880</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26982" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26982</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27030" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-27030</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27046" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27046</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35857" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35857</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35885" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35885</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35907" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35907</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36924" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36924</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36952" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36952</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38580" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2024-38580</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928001" comment="bpftool is earlier than 0:7.3.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928002" comment="kernel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928003" comment="kernel-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928004" comment="kernel-debug is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928005" comment="kernel-debug-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928012" comment="kernel-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928014" comment="kernel-headers is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928015" comment="kernel-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928016" comment="kernel-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928018" comment="kernel-tools is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928021" comment="perf is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928022" comment="python3-perf is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928023" comment="rtla is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928024" comment="rv is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928032" comment="kernel-rt is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928033" comment="kernel-rt-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928044" comment="kernel-64k is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928045" comment="kernel-64k-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928060" comment="libperf is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244928062" comment="kernel-doc is earlier than 0:5.14.0-427.28.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241438" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1438: nodejs security update (Important)</title>
        <reference ref_id="RHSA-2024:1438" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1438"/>
        <reference ref_id="CVE-2024-22019" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-22019"/>
        <reference ref_id="ALSA-2024:1438" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1438.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-20"/>
          <updated date="2024-03-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2264574" id="2264574"></bugzilla>
          <cve public="20240216" href="https://access.redhat.com/security/cve/CVE-2024-22019" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-22019</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241438010" comment="nodejs is earlier than 1:16.20.2-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241438011" comment="nodejs-full-i18n is earlier than 1:16.20.2-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241438012" comment="nodejs-libs is earlier than 1:16.20.2-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241438013" comment="npm is earlier than 1:8.19.4-1.16.20.2.4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241438014" comment="nodejs-docs is earlier than 1:16.20.2-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241462" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:1462: golang security update (Important)</title>
        <reference ref_id="RHSA-2024:1462" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1462"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:1462" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1462.html"/>
        <description>The golang packages provide the Go programming language compiler.

Security Fix(es):

 * golang: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-21"/>
          <updated date="2024-03-21"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462014" comment="go-toolset is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462003" comment="golang is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462005" comment="golang-bin is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462007" comment="golang-docs is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462009" comment="golang-misc is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462011" comment="golang-src is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241462013" comment="golang-tests is earlier than 0:1.20.12-2.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241485" version="641" class="patch">
      <metadata>
        <title>ALSA-2024:1485: firefox security update (Critical)</title>
        <reference ref_id="RHSA-2024:1485" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1485"/>
        <reference ref_id="CVE-2023-5388" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5388"/>
        <reference ref_id="CVE-2024-0743" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0743"/>
        <reference ref_id="CVE-2024-2607" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2607"/>
        <reference ref_id="CVE-2024-2608" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2608"/>
        <reference ref_id="CVE-2024-2610" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2610"/>
        <reference ref_id="CVE-2024-2611" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2611"/>
        <reference ref_id="CVE-2024-2612" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2612"/>
        <reference ref_id="CVE-2024-2614" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2614"/>
        <reference ref_id="CVE-2024-2616" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2616"/>
        <reference ref_id="CVE-2024-29944" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-29944"/>
        <reference ref_id="ALSA-2024:1485" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1485.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance, and portability.

This update upgrades Firefox to version 115.9.1 ESR.

Security Fix(es):

* nss: timing attack against RSA decryption (CVE-2023-5388)
* Mozilla: Crash in NSS TLS method (CVE-2024-0743)
* Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607)
* Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608)
* Mozilla: Improve handling of out-of-memory conditions in ICU (CVE-2024-2616)
* Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610)
* Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611)
* Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612)
* Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614)
* Mozilla: Privileged JavaScript Execution via Event Handlers (CVE-2024-29944)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Critical</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-25"/>
          <updated date="2024-03-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243644" id="2243644"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2260012" id="2260012"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270660" id="2270660"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270661" id="2270661"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270662" id="2270662"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270663" id="2270663"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270664" id="2270664"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270665" id="2270665"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270666" id="2270666"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271064" id="2271064"></bugzilla>
          <cve public="20231012" href="https://access.redhat.com/security/cve/CVE-2023-5388" impact="Moderate" cwe="CWE-208" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-5388</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2024-0743" impact="Important" cwe="CWE-252" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-0743</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2607" impact="Important" cwe="CWE-1262" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-2607</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2608" impact="Important" cwe="CWE-190-&gt;CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-2608</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2610" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-2610</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2611" impact="Moderate" cwe="CWE-449" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-2611</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2612" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-2612</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2614" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-2614</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2616" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-2616</cve>
          <cve public="20240322" href="https://access.redhat.com/security/cve/CVE-2024-29944" impact="Critical" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-29944</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241485004" comment="firefox is earlier than 0:115.9.1-1.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241485005" comment="firefox-x11 is earlier than 0:115.9.1-1.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241502" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1502: grafana-pcp security update (Important)</title>
        <reference ref_id="RHSA-2024:1502" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1502"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:1502" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1502.html"/>
        <description>grafana-pcp is an open source Grafana plugin for PCP.

Security Fix(es):

* grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-25"/>
          <updated date="2024-03-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20241502002" comment="grafana-pcp is earlier than 0:5.1.1-2.el9_3.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20246946002" comment="grafana-pcp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241530" version="634" class="patch">
      <metadata>
        <title>ALSA-2024:1530: expat security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1530" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1530"/>
        <reference ref_id="CVE-2023-52425" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52425"/>
        <reference ref_id="CVE-2024-28757" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28757"/>
        <reference ref_id="ALSA-2024:1530" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1530.html"/>
        <description>Expat is a C library for parsing XML documents.

Security Fix(es):

* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)
* expat: XML Entity Expansion (CVE-2024-28757)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-03-26"/>
          <updated date="2024-03-26"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262877" id="2262877"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268766" id="2268766"></bugzilla>
          <cve public="20240204" href="https://access.redhat.com/security/cve/CVE-2023-52425" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52425</cve>
          <cve public="20240310" href="https://access.redhat.com/security/cve/CVE-2024-28757" impact="Moderate" cwe="CWE-776" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-28757</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241530001" comment="expat is earlier than 0:2.5.0-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244002" comment="expat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241530003" comment="expat-devel is earlier than 0:2.5.0-1.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225244004" comment="expat-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241576" version="634" class="patch">
      <metadata>
        <title>ALSA-2024:1576: ruby:3.1 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2024:1576" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1576"/>
        <reference ref_id="CVE-2021-33621" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-33621"/>
        <reference ref_id="CVE-2023-28755" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28755"/>
        <reference ref_id="CVE-2023-28756" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28756"/>
        <reference ref_id="CVE-2023-36617" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-36617"/>
        <reference ref_id="ALSA-2024:1576" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1576.html"/>
        <description>Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

The following packages have been upgraded to a later upstream version: ruby (3.1). (AlmaLinux-29052)

Security Fix(es):

* ruby/cgi-gem: HTTP response splitting in CGI (CVE-2021-33621)
* ruby: ReDoS vulnerability in URI (CVE-2023-28755)
* ruby: ReDoS vulnerability - upstream's incomplete fix for CVE-2023-28755 (CVE-2023-36617)
* ruby: ReDoS vulnerability in Time (CVE-2023-28756)

Bug Fix(es):

* ruby/rubygem-irb: IRB has hard dependency on rubygem-rdoc (AlmaLinux-29048)
* ruby: Ruby cannot read private key in FIPS mode on AlmaLinux 9 (AlmaLinux-12437)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-01"/>
          <updated date="2024-04-01"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2149706" id="2149706"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184059" id="2184059"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184061" id="2184061"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2218614" id="2218614"></bugzilla>
          <cve public="20221118" href="https://access.redhat.com/security/cve/CVE-2021-33621" impact="Moderate" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2021-33621</cve>
          <cve public="20230321" href="https://access.redhat.com/security/cve/CVE-2023-28755" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-28755</cve>
          <cve public="20230321" href="https://access.redhat.com/security/cve/CVE-2023-28756" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-28756</cve>
          <cve public="20230629" href="https://access.redhat.com/security/cve/CVE-2023-36617" impact="Moderate" cwe="CWE-185" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-36617</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241576055" comment="Module ruby:3.1 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576056" comment="ruby is earlier than 0:3.1.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838044" comment="ruby is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576057" comment="ruby-bundled-gems is earlier than 0:3.1.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576004" comment="ruby-bundled-gems is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576058" comment="ruby-devel is earlier than 0:3.1.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838045" comment="ruby-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576059" comment="ruby-libs is earlier than 0:3.1.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838046" comment="ruby-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576060" comment="rubygem-bigdecimal is earlier than 0:3.1.1-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838047" comment="rubygem-bigdecimal is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576061" comment="rubygem-io-console is earlier than 0:0.5.11-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838048" comment="rubygem-io-console is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576062" comment="rubygem-json is earlier than 0:2.6.1-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838049" comment="rubygem-json is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576063" comment="rubygem-mysql2 is earlier than 0:0.5.4-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576026" comment="rubygem-mysql2 is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576064" comment="rubygem-pg is earlier than 0:1.3.5-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576030" comment="rubygem-pg is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576065" comment="rubygem-psych is earlier than 0:4.0.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838050" comment="rubygem-psych is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576066" comment="rubygem-rbs is earlier than 0:2.7.0-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838058" comment="rubygem-rbs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576067" comment="ruby-default-gems is earlier than 0:3.1.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838051" comment="ruby-default-gems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576068" comment="ruby-doc is earlier than 0:3.1.4-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838052" comment="ruby-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576069" comment="rubygem-bundler is earlier than 0:2.3.26-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838053" comment="rubygem-bundler is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576070" comment="rubygem-irb is earlier than 0:1.4.1-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838054" comment="rubygem-irb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576071" comment="rubygem-minitest is earlier than 0:5.15.0-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838055" comment="rubygem-minitest is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576072" comment="rubygem-mysql2-doc is earlier than 0:0.5.4-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576028" comment="rubygem-mysql2-doc is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576073" comment="rubygem-pg-doc is earlier than 0:1.3.5-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576032" comment="rubygem-pg-doc is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576074" comment="rubygem-power_assert is earlier than 0:2.0.1-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838056" comment="rubygem-power_assert is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576075" comment="rubygem-rake is earlier than 0:13.0.6-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838057" comment="rubygem-rake is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576076" comment="rubygem-rdoc is earlier than 0:6.4.0-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838059" comment="rubygem-rdoc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576077" comment="rubygem-rexml is earlier than 0:3.2.5-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838060" comment="rubygem-rexml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576078" comment="rubygem-rss is earlier than 0:0.2.9-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838061" comment="rubygem-rss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576079" comment="rubygem-test-unit is earlier than 0:3.5.3-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838062" comment="rubygem-test-unit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576080" comment="rubygem-typeprof is earlier than 0:0.21.3-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838063" comment="rubygem-typeprof is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576081" comment="rubygems is earlier than 0:3.3.26-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838064" comment="rubygems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576082" comment="rubygems-devel is earlier than 0:3.3.26-143.module_el9.3.0+60+5ebc989a"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838065" comment="rubygems-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:202410244" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:10244: pam:1.5.1 security update (Important)</title>
        <reference ref_id="CVE-2024-10963" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10963"/>
        <reference ref_id="RHSA-2024:10244" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:10244"/>
        <reference ref_id="ALSA-2024:10244" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-10244.html"/>
        <description>Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.  

Security Fix(es):  

  * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-25"/>
          <updated date="2024-11-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2324291" id="2324291"></bugzilla>
          <cve public="20241107" href="https://access.redhat.com/security/cve/CVE-2024-10963" impact="Important" cwe="CWE-287" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-10963</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410244001" comment="pam is earlier than 0:1.5.1-22.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438002" comment="pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410244002" comment="pam-devel is earlier than 0:1.5.1-22.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438004" comment="pam-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:202410244003" comment="pam-docs is earlier than 0:1.5.1-22.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438006" comment="pam-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20250923" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:0923: buildah security update (Important)</title>
        <reference ref_id="CVE-2024-11218" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11218"/>
        <reference ref_id="RHSA-2025:0923" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:0923"/>
        <reference ref_id="ALSA-2025:0923" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-0923.html"/>
        <description>The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.   

Security Fix(es):  

  * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-02-04"/>
          <updated date="2025-02-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2326231" id="2326231"></bugzilla>
          <cve public="20250120" href="https://access.redhat.com/security/cve/CVE-2024-11218" impact="Important" cwe="CWE-269" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2024-11218</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250923001" comment="buildah-tests is earlier than 2:1.37.6-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228008004" comment="buildah-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250923002" comment="buildah is earlier than 2:1.37.6-1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228008002" comment="buildah is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241691" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1691: varnish security update (Important)</title>
        <reference ref_id="RHSA-2024:1691" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1691"/>
        <reference ref_id="CVE-2024-30156" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-30156"/>
        <reference ref_id="ALSA-2024:1691" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1691.html"/>
        <description>Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Security Fix(es):

* varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-08"/>
          <updated date="2024-04-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2271486" id="2271486"></bugzilla>
          <cve public="20240324" href="https://access.redhat.com/security/cve/CVE-2024-30156" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-30156</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241691001" comment="varnish is earlier than 0:6.6.2-4.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643002" comment="varnish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241691003" comment="varnish-devel is earlier than 0:6.6.2-4.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643004" comment="varnish-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241691006" comment="varnish-docs is earlier than 0:6.6.2-4.el9_3.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228643006" comment="varnish-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241750" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:1750: unbound security update (Important)</title>
        <reference ref_id="RHSA-2024:1750" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1750"/>
        <reference ref_id="CVE-2024-1488" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1488"/>
        <reference ref_id="ALSA-2024:1750" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1750.html"/>
        <description>The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.

Security Fix(es):

* A vulnerability was found in Unbound due to incorrect default permissions,
allowing any process outside the unbound group to modify the unbound runtime
configuration. The default combination of the "control-use-cert: no" option with
either explicit or implicit use of an IP address in the "control-interface"
option could allow improper access. If a process can connect over localhost to
port 8953, it can alter the configuration of unbound.service. This flaw allows
an unprivileged local process to manipulate a running instance, potentially
altering forwarders, allowing them to track all queries forwarded by the local
resolver, and, in some cases, disrupting resolving altogether.

To mitigate the vulnerability, a new file
"/etc/unbound/conf.d/remote-control.conf" has been added and included in the
main unbound configuration file, "unbound.conf". The file contains two
directives that should limit access to unbound.conf:

    control-interface: "/run/unbound/control"
    control-use-cert: "yes"

For details about these directives, run "man unbound.conf".

Updating to the version of unbound provided by this advisory should, in most
cases, address the vulnerability. To verify that your configuration is not
vulnerable, use the "unbound-control status | grep control" command. If the
output contains "control(ssl)" or "control(namedpipe)", your configuration is
not vulnerable. If the command output returns only "control", the configuration
is vulnerable because it does not enforce access only to the unbound group
members. To fix your configuration, add the line "include:
/etc/unbound/conf.d/remote-control.conf" to the end of the file
"/etc/unbound/unbound.conf". If you use a custom
"/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this
file. (CVE-2024-1488)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-10"/>
          <updated date="2024-04-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2264183" id="2264183"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2024-1488" impact="Important" cwe="CWE-276-&gt;CWE-15" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H">CVE-2024-1488</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241750001" comment="python3-unbound is earlier than 0:1.16.2-3.el9_3.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062002" comment="python3-unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241750003" comment="unbound is earlier than 0:1.16.2-3.el9_3.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062004" comment="unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241750008" comment="unbound-devel is earlier than 0:1.16.2-3.el9_3.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062006" comment="unbound-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241750009" comment="unbound-libs is earlier than 0:1.16.2-3.el9_3.5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228062008" comment="unbound-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241789" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:1789: bind security update (Important)</title>
        <reference ref_id="RHSA-2024:1789" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1789"/>
        <reference ref_id="CVE-2023-4408" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4408"/>
        <reference ref_id="CVE-2023-50387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50387"/>
        <reference ref_id="CVE-2023-50868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50868"/>
        <reference ref_id="CVE-2023-5517" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5517"/>
        <reference ref_id="CVE-2023-5679" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5679"/>
        <reference ref_id="CVE-2023-6516" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6516"/>
        <reference ref_id="ALSA-2024:1789" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1789.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
* bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516)
* bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679)
* bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517)
* bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-11"/>
          <updated date="2024-04-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263896" id="2263896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263897" id="2263897"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263909" id="2263909"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263911" id="2263911"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263914" id="2263914"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263917" id="2263917"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-4408" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-4408</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50387" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50387</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50868" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50868</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-5517" impact="Important" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5517</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-5679" impact="Important" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5679</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-6516" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6516</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789001" comment="bind is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789003" comment="bind-chroot is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789023" comment="bind-devel is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789009" comment="bind-dnssec-utils is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789024" comment="bind-libs is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789017" comment="bind-utils is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789025" comment="bind-dyndb-ldap is earlier than 0:11.9-8.el9_3.3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789022" comment="bind-dyndb-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789007" comment="bind-dnssec-doc is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789011" comment="bind-doc is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068012" comment="bind-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789015" comment="bind-license is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789019" comment="python3-bind is earlier than 32:9.16.23-14.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241818" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1818: java-1.8.0-openjdk security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1818" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1818"/>
        <reference ref_id="CVE-2024-21011" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21011"/>
        <reference ref_id="CVE-2024-21068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21068"/>
        <reference ref_id="CVE-2024-21085" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21085"/>
        <reference ref_id="CVE-2024-21094" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21094"/>
        <reference ref_id="ALSA-2024:1818" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1818.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2274977" id="2274977"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275001" id="2275001"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275003" id="2275003"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275005" id="2275005"></bugzilla>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21011" impact="Moderate" cwe="CWE-117" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21011</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21068" impact="Moderate" cwe="CWE-190-&gt;CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21068</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21085" impact="Moderate" cwe="CWE-789" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21085</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21094" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21094</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241818025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.412.b08-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241822" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1822: java-11-openjdk security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1822" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1822"/>
        <reference ref_id="CVE-2024-21011" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21011"/>
        <reference ref_id="CVE-2024-21012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21012"/>
        <reference ref_id="CVE-2024-21068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21068"/>
        <reference ref_id="CVE-2024-21085" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21085"/>
        <reference ref_id="CVE-2024-21094" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21094"/>
        <reference ref_id="ALSA-2024:1822" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1822.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-22"/>
          <updated date="2024-04-22"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2274975" id="2274975"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2274977" id="2274977"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275001" id="2275001"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275003" id="2275003"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275005" id="2275005"></bugzilla>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21011" impact="Moderate" cwe="CWE-117" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21011</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21012" impact="Low" cwe="CWE-350" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21012</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21068" impact="Moderate" cwe="CWE-190-&gt;CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21068</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21085" impact="Moderate" cwe="CWE-789" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21085</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21094" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21094</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822001" comment="java-11-openjdk is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822003" comment="java-11-openjdk-demo is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822009" comment="java-11-openjdk-devel is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822017" comment="java-11-openjdk-headless is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822027" comment="java-11-openjdk-jmods is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822035" comment="java-11-openjdk-src is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241822045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.23.0.9-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241825" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1825: java-17-openjdk security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1825" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1825"/>
        <reference ref_id="CVE-2024-21011" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21011"/>
        <reference ref_id="CVE-2024-21012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21012"/>
        <reference ref_id="CVE-2024-21068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21068"/>
        <reference ref_id="CVE-2024-21094" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21094"/>
        <reference ref_id="ALSA-2024:1825" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1825.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2274975" id="2274975"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2274977" id="2274977"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275003" id="2275003"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275005" id="2275005"></bugzilla>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21011" impact="Moderate" cwe="CWE-117" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21011</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21012" impact="Low" cwe="CWE-350" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21012</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21068" impact="Moderate" cwe="CWE-190-&gt;CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21068</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21094" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21094</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825001" comment="java-17-openjdk is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825003" comment="java-17-openjdk-demo is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825009" comment="java-17-openjdk-devel is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825017" comment="java-17-openjdk-headless is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825027" comment="java-17-openjdk-jmods is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825035" comment="java-17-openjdk-src is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241825045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.11.0.9-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241828" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1828: java-21-openjdk security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1828" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1828"/>
        <reference ref_id="CVE-2024-21011" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21011"/>
        <reference ref_id="CVE-2024-21012" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21012"/>
        <reference ref_id="CVE-2024-21068" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21068"/>
        <reference ref_id="ALSA-2024:1828" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1828.html"/>
        <description>The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.

Security Fix(es):

* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2274975" id="2274975"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2274977" id="2274977"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275003" id="2275003"></bugzilla>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21011" impact="Moderate" cwe="CWE-117" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21011</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21012" impact="Low" cwe="CWE-350" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21012</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-21068" impact="Moderate" cwe="CWE-190-&gt;CWE-787" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21068</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828046" comment="java-21-openjdk is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738002" comment="java-21-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828047" comment="java-21-openjdk-demo is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738004" comment="java-21-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828048" comment="java-21-openjdk-demo-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738006" comment="java-21-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828049" comment="java-21-openjdk-demo-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738008" comment="java-21-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828050" comment="java-21-openjdk-devel is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738010" comment="java-21-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828051" comment="java-21-openjdk-devel-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738012" comment="java-21-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828052" comment="java-21-openjdk-devel-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738014" comment="java-21-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828053" comment="java-21-openjdk-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738016" comment="java-21-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828054" comment="java-21-openjdk-headless is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738018" comment="java-21-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828055" comment="java-21-openjdk-headless-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738020" comment="java-21-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828056" comment="java-21-openjdk-headless-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738022" comment="java-21-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828057" comment="java-21-openjdk-javadoc is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738024" comment="java-21-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828058" comment="java-21-openjdk-javadoc-zip is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738026" comment="java-21-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828059" comment="java-21-openjdk-jmods is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738028" comment="java-21-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828060" comment="java-21-openjdk-jmods-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738030" comment="java-21-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828061" comment="java-21-openjdk-jmods-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738032" comment="java-21-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828062" comment="java-21-openjdk-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738034" comment="java-21-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828063" comment="java-21-openjdk-src is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738036" comment="java-21-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828064" comment="java-21-openjdk-src-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738038" comment="java-21-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828065" comment="java-21-openjdk-src-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738040" comment="java-21-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828066" comment="java-21-openjdk-static-libs is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738042" comment="java-21-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828067" comment="java-21-openjdk-static-libs-fastdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738044" comment="java-21-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241828068" comment="java-21-openjdk-static-libs-slowdebug is earlier than 1:21.0.3.0.9-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738046" comment="java-21-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241879" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1879: gnutls security update (Moderate)</title>
        <reference ref_id="RHSA-2024:1879" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1879"/>
        <reference ref_id="CVE-2024-28834" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28834"/>
        <reference ref_id="CVE-2024-28835" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28835"/>
        <reference ref_id="ALSA-2024:1879" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1879.html"/>
        <description>The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
* gnutls: potential crash during chain building/verification (CVE-2024-28835)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2269084" id="2269084"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269228" id="2269228"></bugzilla>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-28834" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-28834</cve>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-28835" impact="Moderate" cwe="CWE-248" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2024-28835</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241879001" comment="gnutls is earlier than 0:3.7.6-23.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854002" comment="gnutls is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241879003" comment="gnutls-c++ is earlier than 0:3.7.6-23.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854004" comment="gnutls-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241879005" comment="gnutls-dane is earlier than 0:3.7.6-23.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854006" comment="gnutls-dane is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241879007" comment="gnutls-devel is earlier than 0:3.7.6-23.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854008" comment="gnutls-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241879010" comment="gnutls-utils is earlier than 0:3.7.6-23.el9_3.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854010" comment="gnutls-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241903" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:1903: shim bug fix update (Important)</title>
        <reference ref_id="RHSA-2024:1903" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1903"/>
        <reference ref_id="CVE-2023-40546" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40546"/>
        <reference ref_id="CVE-2023-40547" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40547"/>
        <reference ref_id="CVE-2023-40548" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40548"/>
        <reference ref_id="CVE-2023-40549" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40549"/>
        <reference ref_id="CVE-2023-40550" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40550"/>
        <reference ref_id="CVE-2023-40551" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40551"/>
        <reference ref_id="ALSA-2024:1903" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1903.html"/>
        <description>The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.

Security Fix(es):

* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2234589" id="2234589"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241782" id="2241782"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241796" id="2241796"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2241797" id="2241797"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259915" id="2259915"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259918" id="2259918"></bugzilla>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2023-40546" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40546</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2023-40547" impact="Important" cwe="CWE-787-&gt;CWE-125" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H">CVE-2023-40547</cve>
          <cve public="20231003" href="https://access.redhat.com/security/cve/CVE-2023-40548" impact="Moderate" cwe="CWE-190-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2023-40548</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2023-40549" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40549</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2023-40550" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2023-40550</cve>
          <cve public="20240123" href="https://access.redhat.com/security/cve/CVE-2023-40551" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H">CVE-2023-40551</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241903004" comment="shim-aa64 is earlier than 0:15.8-4.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099034" comment="shim-aa64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241903005" comment="shim-x64 is earlier than 0:15.8-4.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099036" comment="shim-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241908" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1908: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:1908" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1908"/>
        <reference ref_id="CVE-2024-2609" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2609"/>
        <reference ref_id="CVE-2024-3852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3852"/>
        <reference ref_id="CVE-2024-3854" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3854"/>
        <reference ref_id="CVE-2024-3857" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3857"/>
        <reference ref_id="CVE-2024-3859" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3859"/>
        <reference ref_id="CVE-2024-3861" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3861"/>
        <reference ref_id="CVE-2024-3864" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3864"/>
        <reference ref_id="ALSA-2024:1908" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1908.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.10.0 ESR.

Security Fix(es):
  
* GetBoundName in the JIT returned the wrong object (CVE-2024-3852)

* Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854)
* Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857)
* Permission prompt input delay could expire when not in focus (CVE-2024-2609)
* Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859)
* Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861)
* Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-18"/>
          <updated date="2024-04-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2275547" id="2275547"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275549" id="2275549"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275550" id="2275550"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275551" id="2275551"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275552" id="2275552"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275553" id="2275553"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275555" id="2275555"></bugzilla>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-2609" impact="Moderate" cwe="CWE-356" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-2609</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-3852" impact="Important" cwe="CWE-843" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-3852</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-3854" impact="Important" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-3854</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-3857" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-3857</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-3859" impact="Moderate" cwe="CWE-190-&gt;CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-3859</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-3861" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-3861</cve>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2024-3864" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-3864</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241908004" comment="firefox is earlier than 0:115.10.0-1.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241908005" comment="firefox-x11 is earlier than 0:115.10.0-1.el9_3.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20241963" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:1963: golang security update (Important)</title>
        <reference ref_id="RHSA-2024:1963" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:1963"/>
        <reference ref_id="CVE-2023-45288" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45288"/>
        <reference ref_id="ALSA-2024:1963" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-1963.html"/>
        <description>The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-23"/>
          <updated date="2024-04-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268273" id="2268273"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2023-45288" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-45288</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963001" comment="go-toolset is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963003" comment="golang is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963005" comment="golang-bin is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963007" comment="golang-docs is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963009" comment="golang-misc is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963011" comment="golang-src is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241963013" comment="golang-tests is earlier than 0:1.20.12-4.el9_3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242033" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2033: libreswan security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:2033" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2033"/>
        <reference ref_id="CVE-2024-2357" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2357"/>
        <reference ref_id="ALSA-2024:2033" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2033.html"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

Security Fix(es):

* libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-24"/>
          <updated date="2024-04-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268952" id="2268952"></bugzilla>
          <cve public="20240311" href="https://access.redhat.com/security/cve/CVE-2024-2357" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2024-2357</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242033002" comment="libreswan is earlier than 0:4.12-1.el9_3.1.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244050002" comment="libreswan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242113" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2113: pcs security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2113" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2113"/>
        <reference ref_id="CVE-2024-25126" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25126"/>
        <reference ref_id="CVE-2024-26141" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26141"/>
        <reference ref_id="CVE-2024-26146" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26146"/>
        <reference ref_id="ALSA-2024:2113" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2113.html"/>
        <description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.

Security Fix(es):

* rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing (CVE-2024-25126)
* rubygem-rack: Possible DoS Vulnerability with Range Header in Rack (CVE-2024-26141)
* rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing (CVE-2024-26146)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265593" id="2265593"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265594" id="2265594"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2265595" id="2265595"></bugzilla>
          <cve public="20240222" href="https://access.redhat.com/security/cve/CVE-2024-25126" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-25126</cve>
          <cve public="20240222" href="https://access.redhat.com/security/cve/CVE-2024-26141" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-26141</cve>
          <cve public="20240222" href="https://access.redhat.com/security/cve/CVE-2024-26146" impact="Moderate" cwe="CWE-1333" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-26146</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242113001" comment="pcs is earlier than 0:0.11.7-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587006" comment="pcs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242113003" comment="pcs-snmp is earlier than 0:0.11.7-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224587008" comment="pcs-snmp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242119" version="642" class="patch">
      <metadata>
        <title>ALSA-2024:2119: Image builder components bug fix, enhancement and security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2119" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2119"/>
        <reference ref_id="CVE-2024-2307" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2307"/>
        <reference ref_id="ALSA-2024:2119" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2119.html"/>
        <description>Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.

Security Fix(es):

* osbuild-composer: race condition may disable GPG verification for package repositories (CVE-2024-2307)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268513" id="2268513"></bugzilla>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-2307" impact="Moderate" cwe="CWE-362-&gt;CWE-347" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L">CVE-2024-2307</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242119006" comment="osbuild-composer is earlier than 0:101-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204004" comment="osbuild-composer is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242119007" comment="osbuild-composer-core is earlier than 0:101-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204006" comment="osbuild-composer-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242119008" comment="osbuild-composer-worker is earlier than 0:101-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232204010" comment="osbuild-composer-worker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242126" version="642" class="patch">
      <metadata>
        <title>ALSA-2024:2126: webkit2gtk3 security update (Important)</title>
        <reference ref_id="RHSA-2024:2126" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2126"/>
        <reference ref_id="CVE-2014-1745" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2014-1745"/>
        <reference ref_id="CVE-2023-32359" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32359"/>
        <reference ref_id="CVE-2023-39928" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39928"/>
        <reference ref_id="CVE-2023-40414" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40414"/>
        <reference ref_id="CVE-2023-41983" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-41983"/>
        <reference ref_id="CVE-2023-42852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42852"/>
        <reference ref_id="CVE-2023-42883" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42883"/>
        <reference ref_id="CVE-2023-42890" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42890"/>
        <reference ref_id="CVE-2024-23206" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-23206"/>
        <reference ref_id="CVE-2024-23213" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-23213"/>
        <reference ref_id="ALSA-2024:2126" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2126.html"/>
        <description>WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)
* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)
* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)
* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)
* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)
* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23206)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241400" id="2241400"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254326" id="2254326"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254327" id="2254327"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269743" id="2269743"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270141" id="2270141"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270143" id="2270143"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270151" id="2270151"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271449" id="2271449"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271453" id="2271453"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271456" id="2271456"></bugzilla>
          <cve public="20240205" href="https://access.redhat.com/security/cve/CVE-2014-1745" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L">CVE-2014-1745</cve>
          <cve public="20231115" href="https://access.redhat.com/security/cve/CVE-2023-32359" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-32359</cve>
          <cve public="20230928" href="https://access.redhat.com/security/cve/CVE-2023-39928" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-39928</cve>
          <cve public="20240205" href="https://access.redhat.com/security/cve/CVE-2023-40414" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-40414</cve>
          <cve public="20231115" href="https://access.redhat.com/security/cve/CVE-2023-41983" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-41983</cve>
          <cve public="20231115" href="https://access.redhat.com/security/cve/CVE-2023-42852" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-42852</cve>
          <cve public="20231212" href="https://access.redhat.com/security/cve/CVE-2023-42883" impact="Moderate" cwe="CWE-119-&gt;CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-42883</cve>
          <cve public="20231212" href="https://access.redhat.com/security/cve/CVE-2023-42890" impact="Moderate" cwe="CWE-119-&gt;CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-42890</cve>
          <cve public="20240122" href="https://access.redhat.com/security/cve/CVE-2024-23206" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2024-23206</cve>
          <cve public="20240205" href="https://access.redhat.com/security/cve/CVE-2024-23213" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-23213</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242126001" comment="webkit2gtk3 is earlier than 0:2.42.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634002" comment="webkit2gtk3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242126003" comment="webkit2gtk3-devel is earlier than 0:2.42.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634004" comment="webkit2gtk3-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242126005" comment="webkit2gtk3-jsc is earlier than 0:2.42.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634006" comment="webkit2gtk3-jsc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242126007" comment="webkit2gtk3-jsc-devel is earlier than 0:2.42.5-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226634008" comment="webkit2gtk3-jsc-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242135" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:2135: qemu-kvm security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2135" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2135"/>
        <reference ref_id="CVE-2023-3019" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3019"/>
        <reference ref_id="CVE-2023-3255" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3255"/>
        <reference ref_id="CVE-2023-42467" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-42467"/>
        <reference ref_id="CVE-2023-5088" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5088"/>
        <reference ref_id="CVE-2023-6683" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6683"/>
        <reference ref_id="ALSA-2024:2135" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2135.html"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

* QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019)
* QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255)
* QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088)
* QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683)
* QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2218486" id="2218486"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2222351" id="2222351"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238291" id="2238291"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2247283" id="2247283"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254825" id="2254825"></bugzilla>
          <cve public="20230601" href="https://access.redhat.com/security/cve/CVE-2023-3019" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H">CVE-2023-3019</cve>
          <cve public="20230704" href="https://access.redhat.com/security/cve/CVE-2023-3255" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-3255</cve>
          <cve public="20230911" href="https://access.redhat.com/security/cve/CVE-2023-42467" impact="Low" cwe="CWE-369" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L">CVE-2023-42467</cve>
          <cve public="20230921" href="https://access.redhat.com/security/cve/CVE-2023-5088" impact="Moderate" cwe="CWE-821" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5088</cve>
          <cve public="20240112" href="https://access.redhat.com/security/cve/CVE-2023-6683" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6683</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135001" comment="qemu-guest-agent is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135003" comment="qemu-img is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135040" comment="qemu-kvm is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135041" comment="qemu-kvm-audio-pa is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135042" comment="qemu-kvm-block-blkio is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368010" comment="qemu-kvm-block-blkio is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135043" comment="qemu-kvm-block-curl is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135044" comment="qemu-kvm-block-rbd is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135045" comment="qemu-kvm-common is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135046" comment="qemu-kvm-core is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135047" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135048" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135049" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135050" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135051" comment="qemu-kvm-device-usb-host is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135052" comment="qemu-kvm-device-usb-redirect is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135053" comment="qemu-kvm-docs is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135054" comment="qemu-kvm-tools is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135055" comment="qemu-kvm-ui-egl-headless is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135056" comment="qemu-kvm-ui-opengl is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242135057" comment="qemu-pr-helper is earlier than 17:8.2.0-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242137" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2137: LibRaw security update (Low)</title>
        <reference ref_id="RHSA-2024:2137" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2137"/>
        <reference ref_id="CVE-2023-1729" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1729"/>
        <reference ref_id="ALSA-2024:2137" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2137.html"/>
        <description>LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).

Security Fix(es):

* LibRaw: a heap-buffer-overflow in raw2image_ex() (CVE-2023-1729)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2188240" id="2188240"></bugzilla>
          <cve public="20230114" href="https://access.redhat.com/security/cve/CVE-2023-1729" impact="Low" cwe="CWE-119-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2023-1729</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242137001" comment="LibRaw is earlier than 0:0.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236343002" comment="LibRaw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242137004" comment="LibRaw-devel is earlier than 0:0.21.1-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236343004" comment="LibRaw-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242145" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2145: libX11 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2145" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2145"/>
        <reference ref_id="CVE-2023-43785" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43785"/>
        <reference ref_id="CVE-2023-43786" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43786"/>
        <reference ref_id="CVE-2023-43787" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43787"/>
        <reference ref_id="ALSA-2024:2145" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2145.html"/>
        <description>The libX11 packages contain the core X11 protocol client library.

Security Fix(es):

* libX11: out-of-bounds memory access in _XkbReadKeySyms() (CVE-2023-43785)
* libX11: stack exhaustion from infinite recursion in PutSubImage() (CVE-2023-43786)
* libX11: integer overflow in XCreateImage() leading to a heap overflow (CVE-2023-43787)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242252" id="2242252"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2242253" id="2242253"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2242254" id="2242254"></bugzilla>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43785" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-43785</cve>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43786" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-43786</cve>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43787" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-43787</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242145001" comment="libX11 is earlier than 0:1.7.0-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497002" comment="libX11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242145005" comment="libX11-devel is earlier than 0:1.7.0-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497006" comment="libX11-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242145007" comment="libX11-xcb is earlier than 0:1.7.0-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497008" comment="libX11-xcb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242145003" comment="libX11-common is earlier than 0:1.7.0-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236497004" comment="libX11-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242146" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2146: libXpm security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2146" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2146"/>
        <reference ref_id="CVE-2023-43788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43788"/>
        <reference ref_id="CVE-2023-43789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43789"/>
        <reference ref_id="ALSA-2024:2146" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2146.html"/>
        <description>X.Org X11 libXpm runtime library.

Security Fix(es):

* libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788)
* libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242248" id="2242248"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2242249" id="2242249"></bugzilla>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43788" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-43788</cve>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43789" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-43789</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242146001" comment="libXpm is earlier than 0:3.5.13-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230383002" comment="libXpm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242146003" comment="libXpm-devel is earlier than 0:3.5.13-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230383004" comment="libXpm-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20250922" version="635" class="patch">
      <metadata>
        <title>ALSA-2025:0922: podman security update (Important)</title>
        <reference ref_id="CVE-2024-11218" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-11218"/>
        <reference ref_id="RHSA-2025:0922" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2025:0922"/>
        <reference ref_id="ALSA-2025:0922" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2025-0922.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.  

Security Fix(es):  

  * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2025 AlmaLinux OS</rights>
          <issued date="2025-02-04"/>
          <updated date="2025-02-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2326231" id="2326231"></bugzilla>
          <cve public="20250120" href="https://access.redhat.com/security/cve/CVE-2024-11218" impact="Important" cwe="CWE-269" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2024-11218</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250922001" comment="podman is earlier than 4:5.2.2-13.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250922002" comment="podman-plugins is earlier than 4:5.2.2-13.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250922003" comment="podman-remote is earlier than 4:5.2.2-13.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250922004" comment="podman-tests is earlier than 4:5.2.2-13.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20250922005" comment="podman-docker is earlier than 4:5.2.2-13.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242147" version="642" class="patch">
      <metadata>
        <title>ALSA-2024:2147: ipa security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2147" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2147"/>
        <reference ref_id="CVE-2024-1481" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1481"/>
        <reference ref_id="ALSA-2024:2147" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2147.html"/>
        <description>AlmaLinux Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

Security Fix(es):

* freeipa: specially crafted HTTP requests potentially lead to denial of service (CVE-2024-1481)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262169" id="2262169"></bugzilla>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2024-1481" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-1481</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147001" comment="ipa-client is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141002" comment="ipa-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147005" comment="ipa-client-epn is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141006" comment="ipa-client-epn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147007" comment="ipa-client-samba is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141008" comment="ipa-client-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147013" comment="ipa-server is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141014" comment="ipa-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147019" comment="ipa-server-trust-ad is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141020" comment="ipa-server-trust-ad is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147003" comment="ipa-client-common is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141004" comment="ipa-client-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147009" comment="ipa-common is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141010" comment="ipa-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147011" comment="ipa-selinux is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141012" comment="ipa-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147015" comment="ipa-server-common is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141016" comment="ipa-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147017" comment="ipa-server-dns is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141018" comment="ipa-server-dns is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147021" comment="python3-ipaclient is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141022" comment="python3-ipaclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147023" comment="python3-ipalib is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141024" comment="python3-ipalib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147025" comment="python3-ipaserver is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141026" comment="python3-ipaserver is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242147027" comment="python3-ipatests is earlier than 0:4.11.0-9.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141028" comment="python3-ipatests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242160" version="646" class="patch">
      <metadata>
        <title>ALSA-2024:2160: toolbox security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2160" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2160"/>
        <reference ref_id="CVE-2023-39318" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39318"/>
        <reference ref_id="CVE-2023-39319" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39319"/>
        <reference ref_id="CVE-2023-39326" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39326"/>
        <reference ref_id="ALSA-2024:2160" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2160.html"/>
        <description>Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.

Security Fix(es):

* golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)
* golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)
* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2237773" id="2237773"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2237776" id="2237776"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253330" id="2253330"></bugzilla>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39318" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-39318</cve>
          <cve public="20230906" href="https://access.redhat.com/security/cve/CVE-2023-39319" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2023-39319</cve>
          <cve public="20231206" href="https://access.redhat.com/security/cve/CVE-2023-39326" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-39326</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242160001" comment="toolbox is earlier than 0:0.0.99.5-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098002" comment="toolbox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242160003" comment="toolbox-tests is earlier than 0:0.0.99.5-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228098004" comment="toolbox-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242169" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:2169: xorg-x11-server security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2169" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2169"/>
        <reference ref_id="CVE-2023-5367" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5367"/>
        <reference ref_id="CVE-2023-5380" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5380"/>
        <reference ref_id="CVE-2023-6377" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6377"/>
        <reference ref_id="CVE-2023-6478" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6478"/>
        <reference ref_id="CVE-2023-6816" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6816"/>
        <reference ref_id="CVE-2024-0229" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0229"/>
        <reference ref_id="CVE-2024-0408" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0408"/>
        <reference ref_id="CVE-2024-0409" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0409"/>
        <reference ref_id="CVE-2024-21885" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21885"/>
        <reference ref_id="CVE-2024-21886" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21886"/>
        <reference ref_id="ALSA-2024:2169" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2169.html"/>
        <description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2243091" id="2243091"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2244736" id="2244736"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253291" id="2253291"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253298" id="2253298"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256540" id="2256540"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256542" id="2256542"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256690" id="2256690"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257689" id="2257689"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257690" id="2257690"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257691" id="2257691"></bugzilla>
          <cve public="20231025" href="https://access.redhat.com/security/cve/CVE-2023-5367" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5367</cve>
          <cve public="20231025" href="https://access.redhat.com/security/cve/CVE-2023-5380" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5380</cve>
          <cve public="20231213" href="https://access.redhat.com/security/cve/CVE-2023-6377" impact="Important" cwe="CWE-787-&gt;CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6377</cve>
          <cve public="20231213" href="https://access.redhat.com/security/cve/CVE-2023-6478" impact="Important" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L">CVE-2023-6478</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-6816" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-6816</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-0229" impact="Important" cwe="CWE-788" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-0229</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-0408" impact="Important" cwe="CWE-158" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-0408</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-0409" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-0409</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-21885" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-21885</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2024-21886" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-21886</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169001" comment="xorg-x11-server-Xdmx is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221002" comment="xorg-x11-server-Xdmx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169003" comment="xorg-x11-server-Xephyr is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221004" comment="xorg-x11-server-Xephyr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169005" comment="xorg-x11-server-Xnest is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221006" comment="xorg-x11-server-Xnest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169007" comment="xorg-x11-server-Xorg is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221008" comment="xorg-x11-server-Xorg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169009" comment="xorg-x11-server-Xvfb is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221010" comment="xorg-x11-server-Xvfb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169011" comment="xorg-x11-server-common is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221012" comment="xorg-x11-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169016" comment="xorg-x11-server-devel is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221014" comment="xorg-x11-server-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242169015" comment="xorg-x11-server-source is earlier than 0:1.20.11-24.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228221016" comment="xorg-x11-server-source is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242180" version="649" class="patch">
      <metadata>
        <title>ALSA-2024:2180: runc security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2180" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2180"/>
        <reference ref_id="CVE-2022-30630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30630"/>
        <reference ref_id="CVE-2022-30631" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30631"/>
        <reference ref_id="CVE-2022-30632" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-30632"/>
        <reference ref_id="CVE-2023-45287" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45287"/>
        <reference ref_id="ALSA-2024:2180" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2180.html"/>
        <description>The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2107342" id="2107342"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107371" id="2107371"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2107386" id="2107386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253193" id="2253193"></bugzilla>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30630" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30630</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30631" impact="Important" cwe="CWE-1325" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30631</cve>
          <cve public="20220712" href="https://access.redhat.com/security/cve/CVE-2022-30632" impact="Moderate" cwe="CWE-1325" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2022-30632</cve>
          <cve public="20231205" href="https://access.redhat.com/security/cve/CVE-2023-45287" impact="Moderate" cwe="CWE-208" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45287</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242180001" comment="runc is earlier than 4:1.1.12-2.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244762002" comment="runc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242184" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2184: libsndfile security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2184" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2184"/>
        <reference ref_id="CVE-2022-33065" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-33065"/>
        <reference ref_id="ALSA-2024:2184" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2184.html"/>
        <description>libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. 

Security Fix(es):

* libsndfile: integer overflow in src/mat4.c and src/au.c leads to DoS (CVE-2022-33065)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2238934" id="2238934"></bugzilla>
          <cve public="20230913" href="https://access.redhat.com/security/cve/CVE-2022-33065" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2022-33065</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242184001" comment="libsndfile is earlier than 0:1.0.31-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242184002" comment="libsndfile is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242184003" comment="libsndfile-devel is earlier than 0:1.0.31-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242184004" comment="libsndfile-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242184007" comment="libsndfile-utils is earlier than 0:1.0.31-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242184006" comment="libsndfile-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242193" version="644" class="patch">
      <metadata>
        <title>ALSA-2024:2193: podman security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2193" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2193"/>
        <reference ref_id="CVE-2023-39326" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39326"/>
        <reference ref_id="CVE-2023-45287" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45287"/>
        <reference ref_id="ALSA-2024:2193" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2193.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2253193" id="2253193"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2253330" id="2253330"></bugzilla>
          <cve public="20231206" href="https://access.redhat.com/security/cve/CVE-2023-39326" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-39326</cve>
          <cve public="20231205" href="https://access.redhat.com/security/cve/CVE-2023-45287" impact="Moderate" cwe="CWE-208" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45287</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242193010" comment="podman is earlier than 2:4.9.4-0.1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242193011" comment="podman-plugins is earlier than 2:4.9.4-0.1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242193012" comment="podman-remote is earlier than 2:4.9.4-0.1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242193013" comment="podman-tests is earlier than 2:4.9.4-0.1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242193014" comment="podman-docker is earlier than 2:4.9.4-0.1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242199" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2199: pmix security update (Important)</title>
        <reference ref_id="RHSA-2024:2199" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2199"/>
        <reference ref_id="CVE-2023-41915" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-41915"/>
        <reference ref_id="ALSA-2024:2199" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2199.html"/>
        <description>The Process Management Interface (PMI) provides process management functions for MPI implementations. PMI Exascale (PMIx) provides an extended version of the PMI standard specifically designed to support clusters up to and including exascale sizes.

Security Fix(es):

* pmix: race condition allows attackers to obtain ownership of arbitrary files (CVE-2023-41915)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2238898" id="2238898"></bugzilla>
          <cve public="20230910" href="https://access.redhat.com/security/cve/CVE-2023-41915" impact="Important" cwe="CWE-362" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-41915</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199001" comment="pmix is earlier than 0:3.2.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199002" comment="pmix is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199003" comment="pmix-devel is earlier than 0:3.2.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199004" comment="pmix-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199005" comment="pmix-pmi is earlier than 0:3.2.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199006" comment="pmix-pmi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199007" comment="pmix-pmi-devel is earlier than 0:3.2.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199008" comment="pmix-pmi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199011" comment="pmix-tools is earlier than 0:3.2.3-5.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242199010" comment="pmix-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242204" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2204: libnbd security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2204" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2204"/>
        <reference ref_id="CVE-2023-5215" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5215"/>
        <reference ref_id="CVE-2023-5871" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5871"/>
        <reference ref_id="ALSA-2024:2204" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2204.html"/>
        <description>Network Block Device (NBD) is a protocol for accessing Block Devices (hard disks and disk-like devices) over a Network. The libnbd is a userspace client library for writing NBD clients.

Security Fix(es):

* libnbd: Malicious NBD server may crash libnbd (CVE-2023-5871)
* libnbd: Crash or misbehaviour when NBD server returns an unexpected block size (CVE-2023-5215)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2241041" id="2241041"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2247308" id="2247308"></bugzilla>
          <cve public="20230921" href="https://access.redhat.com/security/cve/CVE-2023-5215" impact="Low" cwe="CWE-241" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5215</cve>
          <cve public="20231031" href="https://access.redhat.com/security/cve/CVE-2023-5871" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-5871</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204001" comment="libnbd is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204002" comment="libnbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204005" comment="libnbd-devel is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204006" comment="libnbd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204015" comment="nbdfuse is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204008" comment="nbdfuse is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204016" comment="ocaml-libnbd is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204010" comment="ocaml-libnbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204017" comment="ocaml-libnbd-devel is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204012" comment="ocaml-libnbd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204018" comment="python3-libnbd is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204014" comment="python3-libnbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204003" comment="libnbd-bash-completion is earlier than 0:1.18.1-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242204004" comment="libnbd-bash-completion is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242208" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2208: freerdp security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2208" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2208"/>
        <reference ref_id="CVE-2023-39350" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39350"/>
        <reference ref_id="CVE-2023-39351" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39351"/>
        <reference ref_id="CVE-2023-39352" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39352"/>
        <reference ref_id="CVE-2023-39353" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39353"/>
        <reference ref_id="CVE-2023-39354" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39354"/>
        <reference ref_id="CVE-2023-39356" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-39356"/>
        <reference ref_id="CVE-2023-40181" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40181"/>
        <reference ref_id="CVE-2023-40186" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40186"/>
        <reference ref_id="CVE-2023-40188" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40188"/>
        <reference ref_id="CVE-2023-40567" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40567"/>
        <reference ref_id="CVE-2023-40569" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40569"/>
        <reference ref_id="CVE-2023-40589" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-40589"/>
        <reference ref_id="ALSA-2024:2208" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2208.html"/>
        <description>FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: Incorrect offset calculation leading to DOS (CVE-2023-39350)
* freerdp: Null Pointer Dereference leading DOS in RemoteFX (CVE-2023-39351)
* freerdp: invalid offset validation leading to Out Of Bound Write (CVE-2023-39352)
* freerdp: missing offset validation leading to Out-of-Bounds Read in gdi_multi_opaque_rect (CVE-2023-39356)
* freerdp: Integer overflow leading to out-of-bound write vulnerability in gdi_CreateSurface (CVE-2023-40186)
* freerdp: Out-of-bounds write in clear_decompress_bands_data (CVE-2023-40567)
* freerdp: Out-of-bounds write in the `progressive_decompress` function due to incorrect calculations (CVE-2023-40569)
* freerdp: buffer overflow in ncrush_decompress causes crash with crafted input (CVE-2023-40589)
* freerdp: missing offset validation leading to Out Of Bound Read (CVE-2023-39353)
* freerdp: Out-Of-Bounds Read in nsc_rle_decompress_data (CVE-2023-39354)
* freerdp: integer-Underflow leading to Out-Of-Bound Read in zgfx_decompress_segment (CVE-2023-40181)
* freerdp: Out-of-bounds read in general_LumaToYUV444 (CVE-2023-40188)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2236606" id="2236606"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236650" id="2236650"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236656" id="2236656"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236669" id="2236669"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236730" id="2236730"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236750" id="2236750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236759" id="2236759"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236763" id="2236763"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236766" id="2236766"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236774" id="2236774"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236779" id="2236779"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2236784" id="2236784"></bugzilla>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-39350" impact="Moderate" cwe="CWE-191" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39350</cve>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-39351" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39351</cve>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-39352" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39352</cve>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-39353" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-39353</cve>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-39354" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39354</cve>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-39356" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-39356</cve>
          <cve public="20230901" href="https://access.redhat.com/security/cve/CVE-2023-40181" impact="Low" cwe="(CWE-125|CWE-191)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40181</cve>
          <cve public="20230901" href="https://access.redhat.com/security/cve/CVE-2023-40186" impact="Moderate" cwe="(CWE-190|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40186</cve>
          <cve public="20230901" href="https://access.redhat.com/security/cve/CVE-2023-40188" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40188</cve>
          <cve public="20230901" href="https://access.redhat.com/security/cve/CVE-2023-40567" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40567</cve>
          <cve public="20230901" href="https://access.redhat.com/security/cve/CVE-2023-40569" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40569</cve>
          <cve public="20230831" href="https://access.redhat.com/security/cve/CVE-2023-40589" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-40589</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242208001" comment="freerdp is earlier than 2:2.11.2-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326002" comment="freerdp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242208010" comment="freerdp-devel is earlier than 2:2.11.2-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326004" comment="freerdp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242208011" comment="freerdp-libs is earlier than 2:2.11.2-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326006" comment="freerdp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242208012" comment="libwinpr is earlier than 2:2.11.2-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326008" comment="libwinpr is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242208013" comment="libwinpr-devel is earlier than 2:2.11.2-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232326010" comment="libwinpr-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242213" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2213: pcp security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2213" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2213"/>
        <reference ref_id="CVE-2023-6917" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6917"/>
        <reference ref_id="ALSA-2024:2213" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2213.html"/>
        <description>Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.

Security Fix(es):

* pcp: unsafe use of directories allows pcp to root privilege escalation (CVE-2023-6917)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2254983" id="2254983"></bugzilla>
          <cve public="20240215" href="https://access.redhat.com/security/cve/CVE-2023-6917" impact="Moderate" cwe="(CWE-61|CWE-378)" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N">CVE-2023-6917</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213001" comment="pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213002" comment="pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213003" comment="pcp-conf is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213004" comment="pcp-conf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213209" comment="pcp-devel is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213006" comment="pcp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213009" comment="pcp-export-pcp2elasticsearch is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213010" comment="pcp-export-pcp2elasticsearch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213011" comment="pcp-export-pcp2graphite is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213012" comment="pcp-export-pcp2graphite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213013" comment="pcp-export-pcp2influxdb is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213014" comment="pcp-export-pcp2influxdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213015" comment="pcp-export-pcp2json is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213016" comment="pcp-export-pcp2json is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213017" comment="pcp-export-pcp2spark is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213018" comment="pcp-export-pcp2spark is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213019" comment="pcp-export-pcp2xml is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213020" comment="pcp-export-pcp2xml is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213021" comment="pcp-export-pcp2zabbix is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213022" comment="pcp-export-pcp2zabbix is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213023" comment="pcp-export-zabbix-agent is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213024" comment="pcp-export-zabbix-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213025" comment="pcp-geolocate is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213026" comment="pcp-geolocate is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213027" comment="pcp-gui is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213028" comment="pcp-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213029" comment="pcp-import-collectl2pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213030" comment="pcp-import-collectl2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213031" comment="pcp-import-ganglia2pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213032" comment="pcp-import-ganglia2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213033" comment="pcp-import-iostat2pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213034" comment="pcp-import-iostat2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213035" comment="pcp-import-mrtg2pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213036" comment="pcp-import-mrtg2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213037" comment="pcp-import-sar2pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213038" comment="pcp-import-sar2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213210" comment="pcp-libs is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213040" comment="pcp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213211" comment="pcp-libs-devel is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213042" comment="pcp-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213043" comment="pcp-pmda-activemq is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213044" comment="pcp-pmda-activemq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213045" comment="pcp-pmda-apache is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213046" comment="pcp-pmda-apache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213047" comment="pcp-pmda-bash is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213048" comment="pcp-pmda-bash is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213049" comment="pcp-pmda-bcc is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213050" comment="pcp-pmda-bcc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213051" comment="pcp-pmda-bind2 is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213052" comment="pcp-pmda-bind2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213053" comment="pcp-pmda-bonding is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213054" comment="pcp-pmda-bonding is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213212" comment="pcp-pmda-bpf is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213056" comment="pcp-pmda-bpf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213057" comment="pcp-pmda-bpftrace is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213058" comment="pcp-pmda-bpftrace is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213059" comment="pcp-pmda-cifs is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213060" comment="pcp-pmda-cifs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213061" comment="pcp-pmda-cisco is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213062" comment="pcp-pmda-cisco is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213063" comment="pcp-pmda-dbping is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213064" comment="pcp-pmda-dbping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213065" comment="pcp-pmda-denki is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213066" comment="pcp-pmda-denki is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213067" comment="pcp-pmda-dm is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213068" comment="pcp-pmda-dm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213069" comment="pcp-pmda-docker is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213070" comment="pcp-pmda-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213071" comment="pcp-pmda-ds389 is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213072" comment="pcp-pmda-ds389 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213073" comment="pcp-pmda-ds389log is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213074" comment="pcp-pmda-ds389log is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213075" comment="pcp-pmda-elasticsearch is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213076" comment="pcp-pmda-elasticsearch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213077" comment="pcp-pmda-farm is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213078" comment="pcp-pmda-farm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213079" comment="pcp-pmda-gfs2 is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213080" comment="pcp-pmda-gfs2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213081" comment="pcp-pmda-gluster is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213082" comment="pcp-pmda-gluster is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213083" comment="pcp-pmda-gpfs is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213084" comment="pcp-pmda-gpfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213085" comment="pcp-pmda-gpsd is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213086" comment="pcp-pmda-gpsd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213087" comment="pcp-pmda-hacluster is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213088" comment="pcp-pmda-hacluster is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213089" comment="pcp-pmda-haproxy is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213090" comment="pcp-pmda-haproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213213" comment="pcp-pmda-infiniband is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213092" comment="pcp-pmda-infiniband is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213093" comment="pcp-pmda-json is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213094" comment="pcp-pmda-json is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213095" comment="pcp-pmda-libvirt is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213096" comment="pcp-pmda-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213097" comment="pcp-pmda-lio is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213098" comment="pcp-pmda-lio is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213099" comment="pcp-pmda-lmsensors is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213100" comment="pcp-pmda-lmsensors is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213101" comment="pcp-pmda-logger is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213102" comment="pcp-pmda-logger is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213103" comment="pcp-pmda-lustre is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213104" comment="pcp-pmda-lustre is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213105" comment="pcp-pmda-lustrecomm is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213106" comment="pcp-pmda-lustrecomm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213107" comment="pcp-pmda-mailq is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213108" comment="pcp-pmda-mailq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213109" comment="pcp-pmda-memcache is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213110" comment="pcp-pmda-memcache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213111" comment="pcp-pmda-mic is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213112" comment="pcp-pmda-mic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213113" comment="pcp-pmda-mongodb is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213114" comment="pcp-pmda-mongodb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213115" comment="pcp-pmda-mounts is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213116" comment="pcp-pmda-mounts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213214" comment="pcp-pmda-mssql is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213118" comment="pcp-pmda-mssql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213119" comment="pcp-pmda-mysql is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213120" comment="pcp-pmda-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213121" comment="pcp-pmda-named is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213122" comment="pcp-pmda-named is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213123" comment="pcp-pmda-netcheck is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213124" comment="pcp-pmda-netcheck is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213125" comment="pcp-pmda-netfilter is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213126" comment="pcp-pmda-netfilter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213127" comment="pcp-pmda-news is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213128" comment="pcp-pmda-news is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213129" comment="pcp-pmda-nfsclient is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213130" comment="pcp-pmda-nfsclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213131" comment="pcp-pmda-nginx is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213132" comment="pcp-pmda-nginx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213133" comment="pcp-pmda-nvidia-gpu is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213134" comment="pcp-pmda-nvidia-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213135" comment="pcp-pmda-openmetrics is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213136" comment="pcp-pmda-openmetrics is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213137" comment="pcp-pmda-openvswitch is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213138" comment="pcp-pmda-openvswitch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213139" comment="pcp-pmda-oracle is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213140" comment="pcp-pmda-oracle is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213141" comment="pcp-pmda-pdns is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213142" comment="pcp-pmda-pdns is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213215" comment="pcp-pmda-perfevent is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213144" comment="pcp-pmda-perfevent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213145" comment="pcp-pmda-podman is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213146" comment="pcp-pmda-podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213147" comment="pcp-pmda-postfix is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213148" comment="pcp-pmda-postfix is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213149" comment="pcp-pmda-postgresql is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213150" comment="pcp-pmda-postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213151" comment="pcp-pmda-rabbitmq is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213152" comment="pcp-pmda-rabbitmq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213153" comment="pcp-pmda-redis is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213154" comment="pcp-pmda-redis is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213216" comment="pcp-pmda-resctrl is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213156" comment="pcp-pmda-resctrl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213157" comment="pcp-pmda-roomtemp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213158" comment="pcp-pmda-roomtemp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213159" comment="pcp-pmda-rsyslog is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213160" comment="pcp-pmda-rsyslog is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213161" comment="pcp-pmda-samba is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213162" comment="pcp-pmda-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213163" comment="pcp-pmda-sendmail is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213164" comment="pcp-pmda-sendmail is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213165" comment="pcp-pmda-shping is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213166" comment="pcp-pmda-shping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213167" comment="pcp-pmda-slurm is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213168" comment="pcp-pmda-slurm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213169" comment="pcp-pmda-smart is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213170" comment="pcp-pmda-smart is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213171" comment="pcp-pmda-snmp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213172" comment="pcp-pmda-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213173" comment="pcp-pmda-sockets is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213174" comment="pcp-pmda-sockets is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213175" comment="pcp-pmda-statsd is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213176" comment="pcp-pmda-statsd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213177" comment="pcp-pmda-summary is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213178" comment="pcp-pmda-summary is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213179" comment="pcp-pmda-systemd is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213180" comment="pcp-pmda-systemd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213181" comment="pcp-pmda-trace is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213182" comment="pcp-pmda-trace is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213183" comment="pcp-pmda-unbound is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213184" comment="pcp-pmda-unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213185" comment="pcp-pmda-weblog is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213186" comment="pcp-pmda-weblog is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213187" comment="pcp-pmda-zimbra is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213188" comment="pcp-pmda-zimbra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213189" comment="pcp-pmda-zswap is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213190" comment="pcp-pmda-zswap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213191" comment="pcp-selinux is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213192" comment="pcp-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213193" comment="pcp-system-tools is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213194" comment="pcp-system-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213217" comment="pcp-testsuite is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213196" comment="pcp-testsuite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213197" comment="pcp-zeroconf is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213198" comment="pcp-zeroconf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213199" comment="perl-PCP-LogImport is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213200" comment="perl-PCP-LogImport is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213201" comment="perl-PCP-LogSummary is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213202" comment="perl-PCP-LogSummary is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213203" comment="perl-PCP-MMV is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213204" comment="perl-PCP-MMV is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213205" comment="perl-PCP-PMDA is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213206" comment="perl-PCP-PMDA is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213207" comment="python3-pcp is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213208" comment="python3-pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213007" comment="pcp-doc is earlier than 0:6.2.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213008" comment="pcp-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242217" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2217: motif security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2217" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2217"/>
        <reference ref_id="CVE-2023-43788" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43788"/>
        <reference ref_id="CVE-2023-43789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-43789"/>
        <reference ref_id="ALSA-2024:2217" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2217.html"/>
        <description>The motif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager.

Security Fix(es):

* libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788)
* libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2242248" id="2242248"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2242249" id="2242249"></bugzilla>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43788" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-43788</cve>
          <cve public="20231004" href="https://access.redhat.com/security/cve/CVE-2023-43789" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N">CVE-2023-43789</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242217001" comment="motif is earlier than 0:2.3.4-28.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242217002" comment="motif is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242217003" comment="motif-devel is earlier than 0:2.3.4-28.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242217004" comment="motif-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242228" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2228: perl security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2228" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2228"/>
        <reference ref_id="CVE-2023-47038" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-47038"/>
        <reference ref_id="ALSA-2024:2228" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2228.html"/>
        <description>Perl is a high-level programming language that is commonly used for system administration utilities and web programming.

Security Fix(es):

* perl: Write past buffer end via illegal user-defined Unicode property (CVE-2023-47038)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2249523" id="2249523"></bugzilla>
          <cve public="20231125" href="https://access.redhat.com/security/cve/CVE-2023-47038" impact="Moderate" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-47038</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228001" comment="perl is earlier than 4:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228002" comment="perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228009" comment="perl-B is earlier than 0:1.80-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228010" comment="perl-B is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228019" comment="perl-Devel-Peek is earlier than 0:1.28-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228020" comment="perl-Devel-Peek is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228027" comment="perl-DynaLoader is earlier than 0:1.47-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228028" comment="perl-DynaLoader is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228031" comment="perl-Errno is earlier than 0:1.30-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228032" comment="perl-Errno is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228039" comment="perl-Fcntl is earlier than 0:1.13-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228040" comment="perl-Fcntl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228047" comment="perl-File-DosGlob is earlier than 0:1.12-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228048" comment="perl-File-DosGlob is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228059" comment="perl-GDBM_File is earlier than 0:1.18-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228060" comment="perl-GDBM_File is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228063" comment="perl-Hash-Util is earlier than 0:0.23-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228064" comment="perl-Hash-Util is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228065" comment="perl-Hash-Util-FieldHash is earlier than 0:1.20-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228066" comment="perl-Hash-Util-FieldHash is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228071" comment="perl-I18N-Langinfo is earlier than 0:0.19-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228072" comment="perl-I18N-Langinfo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228073" comment="perl-IO is earlier than 0:1.43-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228074" comment="perl-IO is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228085" comment="perl-NDBM_File is earlier than 0:1.15-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228086" comment="perl-NDBM_File is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228091" comment="perl-ODBM_File is earlier than 0:1.16-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228092" comment="perl-ODBM_File is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228093" comment="perl-Opcode is earlier than 0:1.48-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228094" comment="perl-Opcode is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228095" comment="perl-POSIX is earlier than 0:1.94-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228096" comment="perl-POSIX is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228111" comment="perl-Sys-Hostname is earlier than 0:1.23-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228112" comment="perl-Sys-Hostname is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228133" comment="perl-Time-Piece is earlier than 0:1.3401-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228134" comment="perl-Time-Piece is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228201" comment="perl-devel is earlier than 4:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228150" comment="perl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228163" comment="perl-interpreter is earlier than 4:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228164" comment="perl-interpreter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228167" comment="perl-lib is earlier than 0:0.65-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228168" comment="perl-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228202" comment="perl-libs is earlier than 4:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228172" comment="perl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228179" comment="perl-mro is earlier than 0:1.23-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228180" comment="perl-mro is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228187" comment="perl-ph is earlier than 0:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228188" comment="perl-ph is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228003" comment="perl-Attribute-Handlers is earlier than 0:1.01-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228004" comment="perl-Attribute-Handlers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228005" comment="perl-AutoLoader is earlier than 0:5.74-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228006" comment="perl-AutoLoader is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228007" comment="perl-AutoSplit is earlier than 0:5.74-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228008" comment="perl-AutoSplit is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228011" comment="perl-Benchmark is earlier than 0:1.23-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228012" comment="perl-Benchmark is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228013" comment="perl-Class-Struct is earlier than 0:0.66-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228014" comment="perl-Class-Struct is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228015" comment="perl-Config-Extensions is earlier than 0:0.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228016" comment="perl-Config-Extensions is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228017" comment="perl-DBM_Filter is earlier than 0:0.06-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228018" comment="perl-DBM_Filter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228021" comment="perl-Devel-SelfStubber is earlier than 0:1.06-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228022" comment="perl-Devel-SelfStubber is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228023" comment="perl-DirHandle is earlier than 0:1.05-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228024" comment="perl-DirHandle is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228025" comment="perl-Dumpvalue is earlier than 0:2.27-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228026" comment="perl-Dumpvalue is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228029" comment="perl-English is earlier than 0:1.11-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228030" comment="perl-English is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228033" comment="perl-ExtUtils-Constant is earlier than 0:0.25-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228034" comment="perl-ExtUtils-Constant is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228035" comment="perl-ExtUtils-Embed is earlier than 0:1.35-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228036" comment="perl-ExtUtils-Embed is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228037" comment="perl-ExtUtils-Miniperl is earlier than 0:1.09-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228038" comment="perl-ExtUtils-Miniperl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228041" comment="perl-File-Basename is earlier than 0:2.85-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228042" comment="perl-File-Basename is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228043" comment="perl-File-Compare is earlier than 0:1.100.600-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228044" comment="perl-File-Compare is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228045" comment="perl-File-Copy is earlier than 0:2.34-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228046" comment="perl-File-Copy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228049" comment="perl-File-Find is earlier than 0:1.37-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228050" comment="perl-File-Find is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228051" comment="perl-File-stat is earlier than 0:1.09-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228052" comment="perl-File-stat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228053" comment="perl-FileCache is earlier than 0:1.10-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228054" comment="perl-FileCache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228055" comment="perl-FileHandle is earlier than 0:2.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228056" comment="perl-FileHandle is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228057" comment="perl-FindBin is earlier than 0:1.51-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228058" comment="perl-FindBin is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228061" comment="perl-Getopt-Std is earlier than 0:1.12-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228062" comment="perl-Getopt-Std is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228067" comment="perl-I18N-Collate is earlier than 0:1.02-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228068" comment="perl-I18N-Collate is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228069" comment="perl-I18N-LangTags is earlier than 0:0.44-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228070" comment="perl-I18N-LangTags is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228075" comment="perl-IPC-Open3 is earlier than 0:1.21-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228076" comment="perl-IPC-Open3 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228077" comment="perl-Locale-Maketext-Simple is earlier than 1:0.21-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228078" comment="perl-Locale-Maketext-Simple is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228079" comment="perl-Math-Complex is earlier than 0:1.59-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228080" comment="perl-Math-Complex is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228081" comment="perl-Memoize is earlier than 0:1.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228082" comment="perl-Memoize is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228083" comment="perl-Module-Loaded is earlier than 1:0.08-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228084" comment="perl-Module-Loaded is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228087" comment="perl-NEXT is earlier than 0:0.67-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228088" comment="perl-NEXT is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228089" comment="perl-Net is earlier than 0:1.02-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228090" comment="perl-Net is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228097" comment="perl-Pod-Functions is earlier than 0:1.13-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228098" comment="perl-Pod-Functions is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228099" comment="perl-Pod-Html is earlier than 0:1.25-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228100" comment="perl-Pod-Html is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228101" comment="perl-Safe is earlier than 0:2.41-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228102" comment="perl-Safe is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228103" comment="perl-Search-Dict is earlier than 0:1.07-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228104" comment="perl-Search-Dict is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228105" comment="perl-SelectSaver is earlier than 0:1.02-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228106" comment="perl-SelectSaver is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228107" comment="perl-SelfLoader is earlier than 0:1.26-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228108" comment="perl-SelfLoader is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228109" comment="perl-Symbol is earlier than 0:1.08-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228110" comment="perl-Symbol is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228113" comment="perl-Term-Complete is earlier than 0:1.403-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228114" comment="perl-Term-Complete is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228115" comment="perl-Term-ReadLine is earlier than 0:1.17-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228116" comment="perl-Term-ReadLine is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228117" comment="perl-Test is earlier than 0:1.31-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228118" comment="perl-Test is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228119" comment="perl-Text-Abbrev is earlier than 0:1.02-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228120" comment="perl-Text-Abbrev is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228121" comment="perl-Thread is earlier than 0:3.05-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228122" comment="perl-Thread is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228123" comment="perl-Thread-Semaphore is earlier than 0:2.13-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228124" comment="perl-Thread-Semaphore is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228125" comment="perl-Tie is earlier than 0:4.6-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228126" comment="perl-Tie is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228127" comment="perl-Tie-File is earlier than 0:1.06-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228128" comment="perl-Tie-File is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228129" comment="perl-Tie-Memoize is earlier than 0:1.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228130" comment="perl-Tie-Memoize is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228131" comment="perl-Time is earlier than 0:1.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228132" comment="perl-Time is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228135" comment="perl-Unicode-UCD is earlier than 0:0.75-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228136" comment="perl-Unicode-UCD is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228137" comment="perl-User-pwent is earlier than 0:1.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228138" comment="perl-User-pwent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228139" comment="perl-autouse is earlier than 0:1.11-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228140" comment="perl-autouse is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228141" comment="perl-base is earlier than 0:2.27-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228142" comment="perl-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228143" comment="perl-blib is earlier than 0:1.07-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228144" comment="perl-blib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228145" comment="perl-debugger is earlier than 0:1.56-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228146" comment="perl-debugger is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228147" comment="perl-deprecate is earlier than 0:0.04-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228148" comment="perl-deprecate is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228151" comment="perl-diagnostics is earlier than 0:1.37-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228152" comment="perl-diagnostics is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228153" comment="perl-doc is earlier than 0:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228154" comment="perl-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228155" comment="perl-encoding-warnings is earlier than 0:0.13-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228156" comment="perl-encoding-warnings is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228157" comment="perl-fields is earlier than 0:2.27-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228158" comment="perl-fields is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228159" comment="perl-filetest is earlier than 0:1.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228160" comment="perl-filetest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228161" comment="perl-if is earlier than 0:0.60.800-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228162" comment="perl-if is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228165" comment="perl-less is earlier than 0:0.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228166" comment="perl-less is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228169" comment="perl-libnetcfg is earlier than 4:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228170" comment="perl-libnetcfg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228173" comment="perl-locale is earlier than 0:1.09-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228174" comment="perl-locale is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228175" comment="perl-macros is earlier than 4:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228176" comment="perl-macros is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228177" comment="perl-meta-notation is earlier than 0:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228178" comment="perl-meta-notation is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228181" comment="perl-open is earlier than 0:1.12-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228182" comment="perl-open is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228183" comment="perl-overload is earlier than 0:1.31-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228184" comment="perl-overload is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228185" comment="perl-overloading is earlier than 0:0.02-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228186" comment="perl-overloading is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228189" comment="perl-sigtrap is earlier than 0:1.09-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228190" comment="perl-sigtrap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228191" comment="perl-sort is earlier than 0:2.04-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228192" comment="perl-sort is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228193" comment="perl-subs is earlier than 0:1.03-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228194" comment="perl-subs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228195" comment="perl-utils is earlier than 0:5.32.1-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228196" comment="perl-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228197" comment="perl-vars is earlier than 0:1.05-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228198" comment="perl-vars is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228199" comment="perl-vmsish is earlier than 0:1.04-481.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242228200" comment="perl-vmsish is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242236" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2236: libvirt security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2236" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2236"/>
        <reference ref_id="CVE-2024-2496" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2496"/>
        <reference ref_id="ALSA-2024:2236" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2236.html"/>
        <description>The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

Security Fix(es):

* libvirt: NULL pointer dereference in udevConnectListAllInterfaces() (CVE-2024-2496)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2269672" id="2269672"></bugzilla>
          <cve public="20240226" href="https://access.redhat.com/security/cve/CVE-2024-2496" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2024-2496</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236062" comment="libvirt is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757063" comment="libvirt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236063" comment="libvirt-client is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757065" comment="libvirt-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236064" comment="libvirt-client-qemu is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757067" comment="libvirt-client-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236065" comment="libvirt-daemon is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757069" comment="libvirt-daemon is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236066" comment="libvirt-daemon-common is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757071" comment="libvirt-daemon-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236067" comment="libvirt-daemon-config-network is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757073" comment="libvirt-daemon-config-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236068" comment="libvirt-daemon-config-nwfilter is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757075" comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236069" comment="libvirt-daemon-driver-interface is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757077" comment="libvirt-daemon-driver-interface is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236070" comment="libvirt-daemon-driver-network is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757079" comment="libvirt-daemon-driver-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236071" comment="libvirt-daemon-driver-nodedev is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757081" comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236072" comment="libvirt-daemon-driver-nwfilter is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757083" comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236073" comment="libvirt-daemon-driver-qemu is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757085" comment="libvirt-daemon-driver-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236074" comment="libvirt-daemon-driver-secret is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757087" comment="libvirt-daemon-driver-secret is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236075" comment="libvirt-daemon-driver-storage is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757089" comment="libvirt-daemon-driver-storage is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236076" comment="libvirt-daemon-driver-storage-core is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757091" comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236077" comment="libvirt-daemon-driver-storage-disk is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757093" comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236078" comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757095" comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236079" comment="libvirt-daemon-driver-storage-logical is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757097" comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236080" comment="libvirt-daemon-driver-storage-mpath is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757099" comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236081" comment="libvirt-daemon-driver-storage-rbd is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757101" comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236082" comment="libvirt-daemon-driver-storage-scsi is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757103" comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236083" comment="libvirt-daemon-kvm is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757105" comment="libvirt-daemon-kvm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236084" comment="libvirt-daemon-lock is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757107" comment="libvirt-daemon-lock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236085" comment="libvirt-daemon-log is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757109" comment="libvirt-daemon-log is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236086" comment="libvirt-daemon-plugin-lockd is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757111" comment="libvirt-daemon-plugin-lockd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236087" comment="libvirt-daemon-plugin-sanlock is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757113" comment="libvirt-daemon-plugin-sanlock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236088" comment="libvirt-daemon-proxy is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757115" comment="libvirt-daemon-proxy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236089" comment="libvirt-devel is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757117" comment="libvirt-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236090" comment="libvirt-docs is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757119" comment="libvirt-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236091" comment="libvirt-libs is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757121" comment="libvirt-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242236092" comment="libvirt-nss is earlier than 0:10.0.0-6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757123" comment="libvirt-nss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242246" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2246: ansible-core bug fix, enhancement, and security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2246" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2246"/>
        <reference ref_id="CVE-2024-0690" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0690"/>
        <reference ref_id="ALSA-2024:2246" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2246.html"/>
        <description>Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

Security Fix(es):

* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)

Bug Fix(es):

* Update ansible-core to 2.14.14 (JIRA:AlmaLinux-23783)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2259013" id="2259013"></bugzilla>
          <cve public="20240118" href="https://access.redhat.com/security/cve/CVE-2024-0690" impact="Moderate" cwe="CWE-117" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N">CVE-2024-0690</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242246001" comment="ansible-core is earlier than 1:2.14.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242246002" comment="ansible-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242246003" comment="ansible-test is earlier than 1:2.14.14-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242246004" comment="ansible-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242264" version="640" class="patch">
      <metadata>
        <title>ALSA-2024:2264: edk2 security update (Important)</title>
        <reference ref_id="RHSA-2024:2264" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2264"/>
        <reference ref_id="CVE-2022-36763" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36763"/>
        <reference ref_id="CVE-2022-36764" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36764"/>
        <reference ref_id="CVE-2023-3446" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3446"/>
        <reference ref_id="CVE-2023-45229" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45229"/>
        <reference ref_id="CVE-2023-45231" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45231"/>
        <reference ref_id="CVE-2023-45232" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45232"/>
        <reference ref_id="CVE-2023-45233" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45233"/>
        <reference ref_id="CVE-2023-45235" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45235"/>
        <reference ref_id="ALSA-2024:2264" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2264.html"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)
* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)
* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)
* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)
* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)
* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)
* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)
* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2224962" id="2224962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257582" id="2257582"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257583" id="2257583"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258677" id="2258677"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258688" id="2258688"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258691" id="2258691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258694" id="2258694"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258700" id="2258700"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2022-36763" impact="Moderate" cwe="CWE-680" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H">CVE-2022-36763</cve>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2022-36764" impact="Moderate" cwe="CWE-680" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H">CVE-2022-36764</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-3446" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-3446</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45229" impact="Moderate" cwe="(CWE-119|CWE-125|CWE-338|CWE-835)" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45229</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45231" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45231</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45232" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-45232</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45233" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-45233</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45235" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-45235</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242264005" comment="edk2-tools is earlier than 0:20231122-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165006" comment="edk2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242264001" comment="edk2-aarch64 is earlier than 0:20231122-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165002" comment="edk2-aarch64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242264003" comment="edk2-ovmf is earlier than 0:20231122-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165004" comment="edk2-ovmf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242264007" comment="edk2-tools-doc is earlier than 0:20231122-6.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165008" comment="edk2-tools-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242276" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2276: qt5-qtbase security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2276" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2276"/>
        <reference ref_id="CVE-2023-51714" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-51714"/>
        <reference ref_id="CVE-2024-25580" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25580"/>
        <reference ref_id="ALSA-2024:2276" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2276.html"/>
        <description>Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. 

Security Fix(es):

* qt: incorrect integer overflow check (CVE-2023-51714)
* qtbase: potential buffer overflow when reading KTX images (CVE-2024-25580)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255856" id="2255856"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2264423" id="2264423"></bugzilla>
          <cve public="20231224" href="https://access.redhat.com/security/cve/CVE-2023-51714" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-51714</cve>
          <cve public="20240215" href="https://access.redhat.com/security/cve/CVE-2024-25580" impact="Moderate" cwe="CWE-121" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-25580</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276001" comment="qt5-qtbase is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369010" comment="qt5-qtbase is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276005" comment="qt5-qtbase-devel is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369014" comment="qt5-qtbase-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276007" comment="qt5-qtbase-examples is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369016" comment="qt5-qtbase-examples is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276009" comment="qt5-qtbase-gui is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369018" comment="qt5-qtbase-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276011" comment="qt5-qtbase-mysql is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369020" comment="qt5-qtbase-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276013" comment="qt5-qtbase-odbc is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369022" comment="qt5-qtbase-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276015" comment="qt5-qtbase-postgresql is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369024" comment="qt5-qtbase-postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276017" comment="qt5-qtbase-private-devel is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369026" comment="qt5-qtbase-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276019" comment="qt5-qtbase-static is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369028" comment="qt5-qtbase-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242276003" comment="qt5-qtbase-common is earlier than 0:5.15.9-9.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369012" comment="qt5-qtbase-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242278" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2278: httpd security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2278" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2278"/>
        <reference ref_id="CVE-2023-31122" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-31122"/>
        <reference ref_id="ALSA-2024:2278" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2278.html"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2245332" id="2245332"></bugzilla>
          <cve public="20231019" href="https://access.redhat.com/security/cve/CVE-2023-31122" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-31122</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278001" comment="httpd is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726022" comment="httpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278003" comment="httpd-core is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726023" comment="httpd-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278005" comment="httpd-devel is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726024" comment="httpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278011" comment="httpd-tools is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726025" comment="httpd-tools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278013" comment="mod_ldap is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726026" comment="mod_ldap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278015" comment="mod_lua is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726027" comment="mod_lua is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278017" comment="mod_proxy_html is earlier than 1:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726028" comment="mod_proxy_html is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278019" comment="mod_session is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726029" comment="mod_session is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278021" comment="mod_ssl is earlier than 1:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726030" comment="mod_ssl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278007" comment="httpd-filesystem is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726031" comment="httpd-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242278009" comment="httpd-manual is earlier than 0:2.4.57-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726032" comment="httpd-manual is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242292" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:2292: python3.11 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2292" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2292"/>
        <reference ref_id="CVE-2023-27043" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-27043"/>
        <reference ref_id="ALSA-2024:2292" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2292.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2196183" id="2196183"></bugzilla>
          <cve public="20230419" href="https://access.redhat.com/security/cve/CVE-2023-27043" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-27043</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292001" comment="python3.11 is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077014" comment="python3.11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292003" comment="python3.11-debug is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077015" comment="python3.11-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292005" comment="python3.11-devel is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077016" comment="python3.11-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292007" comment="python3.11-idle is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077017" comment="python3.11-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292009" comment="python3.11-libs is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077018" comment="python3.11-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292011" comment="python3.11-test is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077019" comment="python3.11-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242292013" comment="python3.11-tkinter is earlier than 0:3.11.7-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244077020" comment="python3.11-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242295" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2295: libjpeg-turbo security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2295" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2295"/>
        <reference ref_id="CVE-2021-29390" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-29390"/>
        <reference ref_id="ALSA-2024:2295" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2295.html"/>
        <description>The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.

Security Fix(es):

* libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c (CVE-2021-29390)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235521" id="2235521"></bugzilla>
          <cve public="20230822" href="https://access.redhat.com/security/cve/CVE-2021-29390" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H">CVE-2021-29390</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242295001" comment="libjpeg-turbo is earlier than 0:2.0.90-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068002" comment="libjpeg-turbo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242295003" comment="libjpeg-turbo-devel is earlier than 0:2.0.90-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068004" comment="libjpeg-turbo-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242295010" comment="libjpeg-turbo-utils is earlier than 0:2.0.90-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068006" comment="libjpeg-turbo-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242295007" comment="turbojpeg is earlier than 0:2.0.90-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068008" comment="turbojpeg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242295009" comment="turbojpeg-devel is earlier than 0:2.0.90-7.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20231068010" comment="turbojpeg-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242298" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2298: tigervnc security update (Important)</title>
        <reference ref_id="RHSA-2024:2298" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2298"/>
        <reference ref_id="CVE-2023-5380" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5380"/>
        <reference ref_id="CVE-2023-5574" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5574"/>
        <reference ref_id="ALSA-2024:2298" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2298.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: Use-after-free bug in DamageDestroy (CVE-2023-5574)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2244735" id="2244735"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2244736" id="2244736"></bugzilla>
          <cve public="20231025" href="https://access.redhat.com/security/cve/CVE-2023-5380" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5380</cve>
          <cve public="20231025" href="https://access.redhat.com/security/cve/CVE-2023-5574" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-5574</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298001" comment="tigervnc is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298009" comment="tigervnc-server is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298011" comment="tigervnc-server-minimal is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298013" comment="tigervnc-server-module is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298003" comment="tigervnc-icons is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298005" comment="tigervnc-license is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242298007" comment="tigervnc-selinux is earlier than 0:1.13.1-8.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242302" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2302: gstreamer1-plugins-base security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2302" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2302"/>
        <reference ref_id="CVE-2023-37328" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37328"/>
        <reference ref_id="ALSA-2024:2302" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2302.html"/>
        <description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.

Security Fix(es):

* gstreamer-plugins-base: heap overwrite in subtitle parsing (CVE-2023-37328)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2254540" id="2254540"></bugzilla>
          <cve public="20230705" href="https://access.redhat.com/security/cve/CVE-2023-37328" impact="Moderate" cwe="CWE-122-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-37328</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242302001" comment="gstreamer1-plugins-base is earlier than 0:1.22.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242302002" comment="gstreamer1-plugins-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242302003" comment="gstreamer1-plugins-base-devel is earlier than 0:1.22.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242302004" comment="gstreamer1-plugins-base-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242302007" comment="gstreamer1-plugins-base-tools is earlier than 0:1.22.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242302006" comment="gstreamer1-plugins-base-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20245363" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:5363: kernel security update (Important)</title>
        <reference ref_id="CVE-2021-47606" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-47606"/>
        <reference ref_id="CVE-2023-52651" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52651"/>
        <reference ref_id="CVE-2023-52864" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52864"/>
        <reference ref_id="CVE-2024-21823" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21823"/>
        <reference ref_id="CVE-2024-26600" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26600"/>
        <reference ref_id="CVE-2024-26808" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26808"/>
        <reference ref_id="CVE-2024-26828" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26828"/>
        <reference ref_id="CVE-2024-26853" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26853"/>
        <reference ref_id="CVE-2024-26868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26868"/>
        <reference ref_id="CVE-2024-26897" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26897"/>
        <reference ref_id="CVE-2024-27049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27049"/>
        <reference ref_id="CVE-2024-27052" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27052"/>
        <reference ref_id="CVE-2024-27065" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27065"/>
        <reference ref_id="CVE-2024-27417" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27417"/>
        <reference ref_id="CVE-2024-27434" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27434"/>
        <reference ref_id="CVE-2024-33621" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-33621"/>
        <reference ref_id="CVE-2024-35789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35789"/>
        <reference ref_id="CVE-2024-35800" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35800"/>
        <reference ref_id="CVE-2024-35823" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35823"/>
        <reference ref_id="CVE-2024-35845" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35845"/>
        <reference ref_id="CVE-2024-35848" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35848"/>
        <reference ref_id="CVE-2024-35852" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35852"/>
        <reference ref_id="CVE-2024-35899" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35899"/>
        <reference ref_id="CVE-2024-35911" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35911"/>
        <reference ref_id="CVE-2024-35937" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35937"/>
        <reference ref_id="CVE-2024-35969" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35969"/>
        <reference ref_id="CVE-2024-36005" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36005"/>
        <reference ref_id="CVE-2024-36017" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36017"/>
        <reference ref_id="CVE-2024-36020" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36020"/>
        <reference ref_id="CVE-2024-36489" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36489"/>
        <reference ref_id="CVE-2024-36903" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36903"/>
        <reference ref_id="CVE-2024-36921" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36921"/>
        <reference ref_id="CVE-2024-36922" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36922"/>
        <reference ref_id="CVE-2024-36929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36929"/>
        <reference ref_id="CVE-2024-36941" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36941"/>
        <reference ref_id="CVE-2024-36971" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36971"/>
        <reference ref_id="CVE-2024-37353" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-37353"/>
        <reference ref_id="CVE-2024-37356" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-37356"/>
        <reference ref_id="CVE-2024-38391" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38391"/>
        <reference ref_id="CVE-2024-38558" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38558"/>
        <reference ref_id="CVE-2024-38575" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38575"/>
        <reference ref_id="CVE-2024-39487" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39487"/>
        <reference ref_id="CVE-2024-40928" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40928"/>
        <reference ref_id="CVE-2024-40954" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40954"/>
        <reference ref_id="CVE-2024-40958" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40958"/>
        <reference ref_id="CVE-2024-40961" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40961"/>
        <reference ref_id="RHSA-2024:5363" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:5363"/>
        <reference ref_id="ALSA-2024:5363" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-5363.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  
Security Fix(es):  

  * kernel: phy: (CVE-2024-26600)
  * kernel: netfilter: multiple flaws (CVE-2024-26808, CVE-2024-27065, CVE-2024-35899, CVE-2024-36005)
  * kernel: cifs: (CVE-2024-26828)
  * kernel: wifi: multiple flaws (CVE-2024-26897, CVE-2024-27052, CVE-2024-27049, CVE-2023-52651, CVE-2024-35789, CVE-2024-27434, CVE-2024-35845, CVE-2024-35937, CVE-2024-36941, CVE-2024-36922, CVE-2024-36921, CVE-2024-38575)
  * kernel: nfs: (CVE-2024-26868)
  * kernel: igc: (CVE-2024-26853)
  * kernel: dmaengine/idxd: (CVE-2024-21823)
  * kernel: ipv6: multiple flaws (CVE-2024-27417, CVE-2024-35969, CVE-2024-36903, CVE-2024-40961)
  * kernel: vt: (CVE-2024-35823)
  * kernel: efi: (CVE-2024-35800)
  * kernel: mlxsw: (CVE-2024-35852)
  * kernel: eeprom: (CVE-2024-35848)
  * kernel: ice: (CVE-2024-35911)
  * kernel: platform/x86: (CVE-2023-52864)
  * kernel: i40e: (CVE-2024-36020)
  * kernel: rtnetlink: (CVE-2024-36017)
  * kernel: net: multiple flaws (CVE-2024-36929, CVE-2024-36971, CVE-2021-47606, CVE-2024-38558, CVE-2024-40928, CVE-2024-40954)
  * kernel: ipvlan: (CVE-2024-33621)
  * kernel: tcp: (CVE-2024-37356)
  * kernel: virtio: (CVE-2024-37353)
  * kernel: tls: (CVE-2024-36489)
  * kernel: cxl/region: (CVE-2024-38391)
  * kernel: bonding: (CVE-2024-39487)
  * kernel: netns: (CVE-2024-40958)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-08-14"/>
          <updated date="2024-08-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265838" id="2265838"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273405" id="2273405"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275600" id="2275600"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275655" id="2275655"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275715" id="2275715"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275748" id="2275748"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278380" id="2278380"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278417" id="2278417"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278429" id="2278429"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278519" id="2278519"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278989" id="2278989"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281057" id="2281057"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281097" id="2281097"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281133" id="2281133"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281190" id="2281190"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281237" id="2281237"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281257" id="2281257"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281265" id="2281265"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281272" id="2281272"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281639" id="2281639"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281667" id="2281667"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281821" id="2281821"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281900" id="2281900"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281949" id="2281949"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282719" id="2282719"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284400" id="2284400"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284417" id="2284417"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284474" id="2284474"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284496" id="2284496"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284511" id="2284511"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284513" id="2284513"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284543" id="2284543"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2292331" id="2292331"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293208" id="2293208"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293418" id="2293418"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293441" id="2293441"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293657" id="2293657"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293658" id="2293658"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293686" id="2293686"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293687" id="2293687"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293688" id="2293688"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297056" id="2297056"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297512" id="2297512"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297538" id="2297538"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297542" id="2297542"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297545" id="2297545"></bugzilla>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2021-47606" impact="Low" cwe="CWE-369" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2021-47606</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2023-52651" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52651</cve>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2023-52864" impact="Moderate" cwe="CWE-402" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52864</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-21823" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H">CVE-2024-21823</cve>
          <cve public="20240224" href="https://access.redhat.com/security/cve/CVE-2024-26600" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26600</cve>
          <cve public="20240404" href="https://access.redhat.com/security/cve/CVE-2024-26808" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26808</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26828" impact="Low" cwe="CWE-191" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H">CVE-2024-26828</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26853" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26853</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26868" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26868</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26897" impact="Low" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26897</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27049" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27049</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27052" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27052</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27065" impact="Low" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27065</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-27417" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27417</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-27434" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27434</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-33621" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-33621</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35789" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35789</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35800" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35800</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35823" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35823</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35845" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35845</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35848" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35848</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35852" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35852</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35899" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35899</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35911" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35911</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35937" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-35937</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-35969" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35969</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-36005" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36005</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36017" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H">CVE-2024-36017</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36020" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36020</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-36489" impact="Low" cwe="CWE-402" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L">CVE-2024-36489</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36903" impact="Moderate" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36903</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36921" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36921</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36922" impact="Low" cwe="CWE-413" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36922</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36929" impact="Moderate" cwe="CWE-822" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36929</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36941" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36941</cve>
          <cve public="20240610" href="https://access.redhat.com/security/cve/CVE-2024-36971" impact="Important" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36971</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-37353" impact="Low" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-37353</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-37356" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-37356</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2024-38391" impact="Low" cwe="CWE-402" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38391</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38558" impact="Moderate" cwe="CWE-665" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38558</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38575" impact="Moderate" cwe="CWE-400-&gt;CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38575</cve>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-39487" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-39487</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40928" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40928</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40954" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40954</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40958" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40958</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40961" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40961</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363001" comment="bpftool is earlier than 0:7.3.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363002" comment="kernel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363003" comment="kernel-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363004" comment="kernel-debug is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363005" comment="kernel-debug-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363012" comment="kernel-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363014" comment="kernel-headers is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363015" comment="kernel-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363016" comment="kernel-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363018" comment="kernel-tools is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363021" comment="perf is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363022" comment="python3-perf is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363023" comment="rtla is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363024" comment="rv is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363032" comment="kernel-rt is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363033" comment="kernel-rt-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363044" comment="kernel-64k is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363045" comment="kernel-64k-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363060" comment="libperf is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245363062" comment="kernel-doc is earlier than 0:5.14.0-427.31.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242303" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2303: gstreamer1-plugins-good security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2303" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2303"/>
        <reference ref_id="CVE-2023-37327" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-37327"/>
        <reference ref_id="ALSA-2024:2303" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2303.html"/>
        <description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.

Security Fix(es):

* gstreamer-plugins-good: integer overflow leading to heap overwrite in FLAC image tag handling (CVE-2023-37327)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2254539" id="2254539"></bugzilla>
          <cve public="20230705" href="https://access.redhat.com/security/cve/CVE-2023-37327" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-37327</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242303001" comment="gstreamer1-plugins-good is earlier than 0:1.22.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232260002" comment="gstreamer1-plugins-good is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242303003" comment="gstreamer1-plugins-good-gtk is earlier than 0:1.22.1-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232260004" comment="gstreamer1-plugins-good-gtk is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242353" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2353: mingw components security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2353" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2353"/>
        <reference ref_id="CVE-2023-1579" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-1579"/>
        <reference ref_id="ALSA-2024:2353" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2353.html"/>
        <description>MinGW (Minimalist GNU for Windows) is a free and open source software development environment to create Microsoft Windows applications.

Security Fix(es):

* binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 (CVE-2023-1579)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2180905" id="2180905"></bugzilla>
          <cve public="20230111" href="https://access.redhat.com/security/cve/CVE-2023-1579" impact="Moderate" cwe="CWE-119-&gt;CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2023-1579</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242353001" comment="mingw-binutils-generic is earlier than 0:2.41-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242353002" comment="mingw-binutils-generic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242353003" comment="mingw32-binutils is earlier than 0:2.41-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242353004" comment="mingw32-binutils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242353005" comment="mingw64-binutils is earlier than 0:2.41-3.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242353006" comment="mingw64-binutils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242410" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2410: harfbuzz security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2410" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2410"/>
        <reference ref_id="CVE-2023-25193" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-25193"/>
        <reference ref_id="ALSA-2024:2410" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2410.html"/>
        <description>HarfBuzz is an implementation of the OpenType Layout engine.

Security Fix(es):

* harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks (CVE-2023-25193)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2167254" id="2167254"></bugzilla>
          <cve public="20230204" href="https://access.redhat.com/security/cve/CVE-2023-25193" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-25193</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242410001" comment="harfbuzz is earlier than 0:2.7.4-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384002" comment="harfbuzz is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242410003" comment="harfbuzz-devel is earlier than 0:2.7.4-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384004" comment="harfbuzz-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242410005" comment="harfbuzz-icu is earlier than 0:2.7.4-10.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228384006" comment="harfbuzz-icu is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242433" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2433: avahi security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2433" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2433"/>
        <reference ref_id="CVE-2023-38469" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38469"/>
        <reference ref_id="CVE-2023-38470" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38470"/>
        <reference ref_id="CVE-2023-38471" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38471"/>
        <reference ref_id="CVE-2023-38472" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38472"/>
        <reference ref_id="CVE-2023-38473" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-38473"/>
        <reference ref_id="ALSA-2024:2433" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2433.html"/>
        <description>Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.

Security Fix(es):

* avahi: Reachable assertion in avahi_dns_packet_append_record (CVE-2023-38469)
* avahi: Reachable assertion in avahi_escape_label (CVE-2023-38470)
* avahi: Reachable assertion in dbus_set_host_name (CVE-2023-38471)
* avahi: Reachable assertion in avahi_rdata_parse (CVE-2023-38472)
* avahi: Reachable assertion in avahi_alternative_host_name (CVE-2023-38473)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2191687" id="2191687"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2191690" id="2191690"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2191691" id="2191691"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2191692" id="2191692"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2191694" id="2191694"></bugzilla>
          <cve public="20230426" href="https://access.redhat.com/security/cve/CVE-2023-38469" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38469</cve>
          <cve public="20230426" href="https://access.redhat.com/security/cve/CVE-2023-38470" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38470</cve>
          <cve public="20230426" href="https://access.redhat.com/security/cve/CVE-2023-38471" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38471</cve>
          <cve public="20230426" href="https://access.redhat.com/security/cve/CVE-2023-38472" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38472</cve>
          <cve public="20230426" href="https://access.redhat.com/security/cve/CVE-2023-38473" impact="Moderate" cwe="CWE-617" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-38473</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433001" comment="avahi is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707002" comment="avahi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433003" comment="avahi-compat-howl is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707004" comment="avahi-compat-howl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433005" comment="avahi-compat-howl-devel is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707006" comment="avahi-compat-howl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433007" comment="avahi-compat-libdns_sd is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707008" comment="avahi-compat-libdns_sd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433009" comment="avahi-compat-libdns_sd-devel is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707010" comment="avahi-compat-libdns_sd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433011" comment="avahi-devel is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707012" comment="avahi-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433013" comment="avahi-glib is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707014" comment="avahi-glib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433015" comment="avahi-glib-devel is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707016" comment="avahi-glib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433017" comment="avahi-libs is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707018" comment="avahi-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242433020" comment="avahi-tools is earlier than 0:0.8-20.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236707020" comment="avahi-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242438" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:2438: pam security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2438" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2438"/>
        <reference ref_id="CVE-2024-22365" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-22365"/>
        <reference ref_id="ALSA-2024:2438" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2438.html"/>
        <description>Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.

Security Fix(es):

* pam: allowing unprivileged user to block another user namespace (CVE-2024-22365)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257722" id="2257722"></bugzilla>
          <cve public="20240118" href="https://access.redhat.com/security/cve/CVE-2024-22365" impact="Moderate" cwe="CWE-277" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-22365</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438001" comment="pam is earlier than 0:1.5.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438002" comment="pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438003" comment="pam-devel is earlier than 0:1.5.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438004" comment="pam-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438007" comment="pam-docs is earlier than 0:1.5.1-19.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242438006" comment="pam-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242447" version="640" class="patch">
      <metadata>
        <title>ALSA-2024:2447: openssl and openssl-fips-provider security update (Low)</title>
        <reference ref_id="RHSA-2024:2447" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2447"/>
        <reference ref_id="CVE-2023-2975" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-2975"/>
        <reference ref_id="CVE-2023-3446" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3446"/>
        <reference ref_id="CVE-2023-3817" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3817"/>
        <reference ref_id="CVE-2023-5678" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5678"/>
        <reference ref_id="CVE-2023-6129" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6129"/>
        <reference ref_id="CVE-2023-6237" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6237"/>
        <reference ref_id="CVE-2024-0727" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0727"/>
        <reference ref_id="ALSA-2024:2447" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2447.html"/>
        <description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries (CVE-2023-2975)
* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
* OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)
* openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)
* openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)
* openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
* openssl: denial of service via null dereference (CVE-2024-0727)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2223016" id="2223016"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2224962" id="2224962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2227852" id="2227852"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2248616" id="2248616"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2257571" id="2257571"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258502" id="2258502"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2259944" id="2259944"></bugzilla>
          <cve public="20230707" href="https://access.redhat.com/security/cve/CVE-2023-2975" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-2975</cve>
          <cve public="20230719" href="https://access.redhat.com/security/cve/CVE-2023-3446" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-3446</cve>
          <cve public="20230731" href="https://access.redhat.com/security/cve/CVE-2023-3817" impact="Low" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2023-3817</cve>
          <cve public="20231024" href="https://access.redhat.com/security/cve/CVE-2023-5678" impact="Low" cwe="CWE-325" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-5678</cve>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2023-6129" impact="Low" cwe="CWE-328" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H">CVE-2023-6129</cve>
          <cve public="20240115" href="https://access.redhat.com/security/cve/CVE-2023-6237" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6237</cve>
          <cve public="20240122" href="https://access.redhat.com/security/cve/CVE-2024-0727" impact="Low" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2024-0727</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242447001" comment="openssl is earlier than 1:3.0.7-27.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224002" comment="openssl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242447008" comment="openssl-devel is earlier than 1:3.0.7-27.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224004" comment="openssl-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242447009" comment="openssl-libs is earlier than 1:3.0.7-27.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224006" comment="openssl-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242447007" comment="openssl-perl is earlier than 1:3.0.7-27.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226224008" comment="openssl-perl is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242456" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2456: grub2 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2456" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2456"/>
        <reference ref_id="CVE-2023-4692" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4692"/>
        <reference ref_id="CVE-2023-4693" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4693"/>
        <reference ref_id="CVE-2024-1048" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1048"/>
        <reference ref_id="ALSA-2024:2456" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2456.html"/>
        <description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

Security Fix(es):

* grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048)
* grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692)
* grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2236613" id="2236613"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2238343" id="2238343"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2256827" id="2256827"></bugzilla>
          <cve public="20231003" href="https://access.redhat.com/security/cve/CVE-2023-4692" impact="Low" cwe="CWE-122" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H">CVE-2023-4692</cve>
          <cve public="20231003" href="https://access.redhat.com/security/cve/CVE-2023-4693" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N">CVE-2023-4693</cve>
          <cve public="20240206" href="https://access.redhat.com/security/cve/CVE-2024-1048" impact="Moderate" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2024-1048</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456030" comment="grub2-efi-aa64 is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099004" comment="grub2-efi-aa64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456031" comment="grub2-efi-aa64-cdboot is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099006" comment="grub2-efi-aa64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456032" comment="grub2-efi-x64 is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099010" comment="grub2-efi-x64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456033" comment="grub2-efi-x64-cdboot is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099012" comment="grub2-efi-x64-cdboot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456034" comment="grub2-pc is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099016" comment="grub2-pc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456035" comment="grub2-ppc64le is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099020" comment="grub2-ppc64le is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456036" comment="grub2-tools is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099024" comment="grub2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456037" comment="grub2-tools-efi is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099026" comment="grub2-tools-efi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456038" comment="grub2-tools-extra is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099028" comment="grub2-tools-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456039" comment="grub2-tools-minimal is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099030" comment="grub2-tools-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456040" comment="grub2-common is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099002" comment="grub2-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456041" comment="grub2-efi-aa64-modules is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099008" comment="grub2-efi-aa64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456042" comment="grub2-efi-x64-modules is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099014" comment="grub2-efi-x64-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456043" comment="grub2-pc-modules is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099018" comment="grub2-pc-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242456044" comment="grub2-ppc64le-modules is earlier than 1:2.06-77.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225099022" comment="grub2-ppc64le-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242337" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2337: python3.11-cryptography security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2337" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2337"/>
        <reference ref_id="CVE-2023-49083" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-49083"/>
        <reference ref_id="ALSA-2024:2337" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2337.html"/>
        <description>The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.

Security Fix(es):

* python-cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2255331" id="2255331"></bugzilla>
          <cve public="20231128" href="https://access.redhat.com/security/cve/CVE-2023-49083" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-49083</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242337001" comment="python3.11-cryptography is earlier than 0:37.0.2-6.el9"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242337002" comment="python3.11-cryptography is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242463" version="641" class="patch">
      <metadata>
        <title>ALSA-2024:2463: systemd security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2463" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2463"/>
        <reference ref_id="CVE-2023-7008" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-7008"/>
        <reference ref_id="ALSA-2024:2463" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2463.html"/>
        <description>The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2222672" id="2222672"></bugzilla>
          <cve public="20221208" href="https://access.redhat.com/security/cve/CVE-2023-7008" impact="Moderate" cwe="CWE-300" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2023-7008</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463024" comment="systemd is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336002" comment="systemd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463025" comment="systemd-boot-unsigned is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463006" comment="systemd-boot-unsigned is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463026" comment="systemd-container is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336004" comment="systemd-container is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463027" comment="systemd-devel is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336006" comment="systemd-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463028" comment="systemd-journal-remote is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336008" comment="systemd-journal-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463029" comment="systemd-libs is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336010" comment="systemd-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463030" comment="systemd-oomd is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336012" comment="systemd-oomd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463031" comment="systemd-pam is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336014" comment="systemd-pam is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463032" comment="systemd-resolved is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336016" comment="systemd-resolved is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463033" comment="systemd-udev is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336020" comment="systemd-udev is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463034" comment="rhel-net-naming-sysattrs is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463002" comment="rhel-net-naming-sysattrs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242463035" comment="systemd-rpm-macros is earlier than 0:252-32.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230336018" comment="systemd-rpm-macros is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242504" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2504: libssh security update (Low)</title>
        <reference ref_id="RHSA-2024:2504" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2504"/>
        <reference ref_id="CVE-2023-6004" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6004"/>
        <reference ref_id="CVE-2023-6918" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6918"/>
        <reference ref_id="ALSA-2024:2504" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2504.html"/>
        <description>libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.

Security Fix(es):

* libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004)
* libssh: Missing checks for return values for digests (CVE-2023-6918)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2251110" id="2251110"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254997" id="2254997"></bugzilla>
          <cve public="20231218" href="https://access.redhat.com/security/cve/CVE-2023-6004" impact="Low" cwe="CWE-74" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L">CVE-2023-6004</cve>
          <cve public="20231218" href="https://access.redhat.com/security/cve/CVE-2023-6918" impact="Low" cwe="CWE-252" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-6918</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242504006" comment="libssh is earlier than 0:0.10.4-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643002" comment="libssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242504007" comment="libssh-devel is earlier than 0:0.10.4-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643006" comment="libssh-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242504008" comment="libssh-config is earlier than 0:0.10.4-13.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236643004" comment="libssh-config is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242512" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2512: file security update (Low)</title>
        <reference ref_id="RHSA-2024:2512" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2512"/>
        <reference ref_id="CVE-2022-48554" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48554"/>
        <reference ref_id="ALSA-2024:2512" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2512.html"/>
        <description>The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats.

Security Fix(es):

* file: stack-based buffer over-read in file_copystr in funcs.c (CVE-2022-48554)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2235714" id="2235714"></bugzilla>
          <cve public="20220121" href="https://access.redhat.com/security/cve/CVE-2022-48554" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2022-48554</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512001" comment="file is earlier than 0:5.39-16.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512002" comment="file is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512009" comment="file-devel is earlier than 0:5.39-16.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512004" comment="file-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512010" comment="file-libs is earlier than 0:5.39-16.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512006" comment="file-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512007" comment="python3-file-magic is earlier than 0:5.39-16.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242512008" comment="python3-file-magic is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242528" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2528: mingw-glib2 security update (Low)</title>
        <reference ref_id="RHSA-2024:2528" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2528"/>
        <reference ref_id="CVE-2023-29499" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-29499"/>
        <reference ref_id="CVE-2023-32611" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32611"/>
        <reference ref_id="CVE-2023-32636" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32636"/>
        <reference ref_id="CVE-2023-32665" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-32665"/>
        <reference ref_id="ALSA-2024:2528" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2528.html"/>
        <description>GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.

Security Fix(es):

* glib: GVariant offset table entry size is not checked in is_normal() (CVE-2023-29499)
* glib: g_variant_byteswap() can take a long time with some non-normal inputs (CVE-2023-32611)
* glib: Timeout in fuzz_variant_text (CVE-2023-32636)
* glib: GVariant deserialisation does not match spec for non-normal data (CVE-2023-32665)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Low</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2211827" id="2211827"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2211828" id="2211828"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2211829" id="2211829"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2211833" id="2211833"></bugzilla>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-29499" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-29499</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-32611" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-32611</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-32636" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-32636</cve>
          <cve public="20221214" href="https://access.redhat.com/security/cve/CVE-2023-32665" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2023-32665</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242528001" comment="mingw32-glib2 is earlier than 0:2.78.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418002" comment="mingw32-glib2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242528003" comment="mingw32-glib2-static is earlier than 0:2.78.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418004" comment="mingw32-glib2-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242528005" comment="mingw64-glib2 is earlier than 0:2.78.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418006" comment="mingw64-glib2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242528007" comment="mingw64-glib2-static is earlier than 0:2.78.0-1.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228418008" comment="mingw64-glib2-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242377" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2377: zziplib security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2377" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2377"/>
        <reference ref_id="CVE-2020-18770" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2020-18770"/>
        <reference ref_id="ALSA-2024:2377" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2377.html"/>
        <description>The zziplib is a lightweight library to easily extract data from zip files.

Security Fix(es):

* zziplib: invalid memory access at zzip_disk_entry_to_file_header in mmapped.c (CVE-2020-18770)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2246907" id="2246907"></bugzilla>
          <cve public="20231028" href="https://access.redhat.com/security/cve/CVE-2020-18770" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2020-18770</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242377001" comment="zziplib is earlier than 0:0.13.71-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242377002" comment="zziplib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242377003" comment="zziplib-devel is earlier than 0:0.13.71-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242377004" comment="zziplib-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242377007" comment="zziplib-utils is earlier than 0:0.13.71-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242377006" comment="zziplib-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20246567" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:6567: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2023-52463" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52463"/>
        <reference ref_id="CVE-2023-52801" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52801"/>
        <reference ref_id="CVE-2024-26629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26629"/>
        <reference ref_id="CVE-2024-26630" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26630"/>
        <reference ref_id="CVE-2024-26720" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26720"/>
        <reference ref_id="CVE-2024-26886" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26886"/>
        <reference ref_id="CVE-2024-26946" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26946"/>
        <reference ref_id="CVE-2024-35791" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35791"/>
        <reference ref_id="CVE-2024-35797" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35797"/>
        <reference ref_id="CVE-2024-35875" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35875"/>
        <reference ref_id="CVE-2024-36000" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36000"/>
        <reference ref_id="CVE-2024-36019" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36019"/>
        <reference ref_id="CVE-2024-36883" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36883"/>
        <reference ref_id="CVE-2024-36979" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36979"/>
        <reference ref_id="CVE-2024-38559" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38559"/>
        <reference ref_id="CVE-2024-38619" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38619"/>
        <reference ref_id="CVE-2024-40927" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40927"/>
        <reference ref_id="CVE-2024-40936" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40936"/>
        <reference ref_id="CVE-2024-41040" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41040"/>
        <reference ref_id="CVE-2024-41044" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41044"/>
        <reference ref_id="CVE-2024-41055" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41055"/>
        <reference ref_id="CVE-2024-41073" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41073"/>
        <reference ref_id="CVE-2024-41096" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41096"/>
        <reference ref_id="CVE-2024-42082" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42082"/>
        <reference ref_id="CVE-2024-42096" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42096"/>
        <reference ref_id="CVE-2024-42102" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42102"/>
        <reference ref_id="CVE-2024-42131" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42131"/>
        <reference ref_id="RHSA-2024:6567" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:6567"/>
        <reference ref_id="ALSA-2024:6567" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-6567.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
  * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)
  * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)
  * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)
  * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)
  * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)
  * kernel: KVM: SVM: Flush pages under kvm-&amp;gt;lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)
  * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)
  * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)
  * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)
  * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)
  * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)
  * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)
  * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)
  * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)
  * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)
  * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)
  * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)
  * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)
  * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)
  * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)
  * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)
  * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)
  * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)
  * kernel: Revert &amp;#34;mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again&amp;#34; (CVE-2024-42102)
  * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)
  * kernel: nvme: avoid double free special payload (CVE-2024-41073)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-09-11"/>
          <updated date="2024-09-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265797" id="2265797"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269434" id="2269434"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269436" id="2269436"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273141" id="2273141"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275678" id="2275678"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278206" id="2278206"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281052" id="2281052"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281151" id="2281151"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281727" id="2281727"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281968" id="2281968"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2282709" id="2282709"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284271" id="2284271"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284402" id="2284402"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293273" id="2293273"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293276" id="2293276"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293440" id="2293440"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297511" id="2297511"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297520" id="2297520"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300409" id="2300409"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300414" id="2300414"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300429" id="2300429"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300491" id="2300491"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300520" id="2300520"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300713" id="2300713"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2301465" id="2301465"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2301496" id="2301496"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2301637" id="2301637"></bugzilla>
          <cve public="20240223" href="https://access.redhat.com/security/cve/CVE-2023-52463" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52463</cve>
          <cve public="20240521" href="https://access.redhat.com/security/cve/CVE-2023-52801" impact="Low" cwe="CWE-99" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52801</cve>
          <cve public="20240313" href="https://access.redhat.com/security/cve/CVE-2024-26629" impact="Moderate" cwe="CWE-393" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26629</cve>
          <cve public="20240313" href="https://access.redhat.com/security/cve/CVE-2024-26630" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H">CVE-2024-26630</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-26720" impact="Moderate" cwe="CWE-369" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26720</cve>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-26886" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26886</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26946" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26946</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35791" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35791</cve>
          <cve public="20240517" href="https://access.redhat.com/security/cve/CVE-2024-35797" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35797</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35875" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35875</cve>
          <cve public="20240520" href="https://access.redhat.com/security/cve/CVE-2024-36000" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-36000</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36019" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H">CVE-2024-36019</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36883" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36883</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-36979" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-36979</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38559" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38559</cve>
          <cve public="20240620" href="https://access.redhat.com/security/cve/CVE-2024-38619" impact="Low" cwe="CWE-457" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38619</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40927" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40927</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40936" impact="Low" cwe="CWE-402" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L">CVE-2024-40936</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41040" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H">CVE-2024-41040</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41044" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-41044</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41055" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-41055</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41073" impact="Moderate" cwe="CWE-415" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H">CVE-2024-41073</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41096" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-41096</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-42082" impact="Moderate" cwe="CWE-770" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42082</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-42096" impact="Low" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H">CVE-2024-42096</cve>
          <cve public="20240730" href="https://access.redhat.com/security/cve/CVE-2024-42102" impact="Moderate" cwe="CWE-369" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42102</cve>
          <cve public="20240730" href="https://access.redhat.com/security/cve/CVE-2024-42131" impact="Moderate" cwe="CWE-190" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42131</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567001" comment="bpftool is earlier than 0:7.3.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567002" comment="kernel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567003" comment="kernel-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567004" comment="kernel-debug is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567005" comment="kernel-debug-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567012" comment="kernel-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567014" comment="kernel-headers is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567015" comment="kernel-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567016" comment="kernel-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567018" comment="kernel-tools is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567021" comment="perf is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567022" comment="python3-perf is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567023" comment="rtla is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567024" comment="rv is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567032" comment="kernel-rt is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567033" comment="kernel-rt-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567044" comment="kernel-64k is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567045" comment="kernel-64k-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567060" comment="libperf is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246567062" comment="kernel-doc is earlier than 0:5.14.0-427.35.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242548" version="639" class="patch">
      <metadata>
        <title>ALSA-2024:2548: podman security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:2548" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2548"/>
        <reference ref_id="CVE-2024-1753" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1753"/>
        <reference ref_id="CVE-2024-24786" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24786"/>
        <reference ref_id="ALSA-2024:2548" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2548.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fixes:

* podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* podman: buildah: full container escape at build time (CVE-2024-1753)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fixes:

* liveness probe not called by podman when using httpGet (JIRA:AlmaLinux-28633)
* Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:AlmaLinux-28629)
* [v4.9] Backport two docker CLI compatibility fixes (JIRA:AlmaLinux-28636)
* Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:AlmaLinux-14922)
* Need to backport podman fix for SIGSEGV in AlmaLinux 9.3/8.9 for UBI based containers (JIRA:AlmaLinux-26843)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265513" id="2265513"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268046" id="2268046"></bugzilla>
          <cve public="20240318" href="https://access.redhat.com/security/cve/CVE-2024-1753" impact="Important" cwe="CWE-269" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2024-1753</cve>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2024-24786" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-24786</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242548010" comment="podman is earlier than 4:4.9.4-3.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242548011" comment="podman-plugins is earlier than 4:4.9.4-3.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242548012" comment="podman-remote is earlier than 4:4.9.4-3.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242548013" comment="podman-tests is earlier than 4:4.9.4-3.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242548014" comment="podman-docker is earlier than 4:4.9.4-3.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242551" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2551: bind security update (Important)</title>
        <reference ref_id="RHSA-2024:2551" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2551"/>
        <reference ref_id="CVE-2023-4408" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4408"/>
        <reference ref_id="CVE-2023-50387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50387"/>
        <reference ref_id="CVE-2023-50868" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-50868"/>
        <reference ref_id="CVE-2023-5517" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5517"/>
        <reference ref_id="CVE-2023-5679" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5679"/>
        <reference ref_id="CVE-2023-6516" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6516"/>
        <reference ref_id="ALSA-2024:2551" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2551.html"/>
        <description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
* bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516)
* bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679)
* bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517)
* bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)

Bug Fix(es):

* bind-dyndb-ldap: rebuilt to adapt ABI changes in bind

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263896" id="2263896"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263897" id="2263897"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263909" id="2263909"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263911" id="2263911"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263914" id="2263914"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2263917" id="2263917"></bugzilla>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-4408" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-4408</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50387" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50387</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-50868" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-50868</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-5517" impact="Important" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5517</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-5679" impact="Important" cwe="CWE-617" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-5679</cve>
          <cve public="20240213" href="https://access.redhat.com/security/cve/CVE-2023-6516" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-6516</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551001" comment="bind is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763002" comment="bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551003" comment="bind-chroot is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763004" comment="bind-chroot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551022" comment="bind-devel is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763006" comment="bind-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551009" comment="bind-dnssec-utils is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763010" comment="bind-dnssec-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551023" comment="bind-libs is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763012" comment="bind-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551017" comment="bind-utils is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763016" comment="bind-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551024" comment="bind-dyndb-ldap is earlier than 0:11.9-9.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241789022" comment="bind-dyndb-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551007" comment="bind-dnssec-doc is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763008" comment="bind-dnssec-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551011" comment="bind-doc is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228068012" comment="bind-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551015" comment="bind-license is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763014" comment="bind-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242551019" comment="python3-bind is earlier than 32:9.16.23-18.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226763018" comment="python3-bind is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20246997" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:6997: kernel security update (Important)</title>
        <reference ref_id="CVE-2023-52439" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52439"/>
        <reference ref_id="CVE-2023-52884" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-52884"/>
        <reference ref_id="CVE-2024-26739" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26739"/>
        <reference ref_id="CVE-2024-26929" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26929"/>
        <reference ref_id="CVE-2024-26930" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26930"/>
        <reference ref_id="CVE-2024-26931" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26931"/>
        <reference ref_id="CVE-2024-26947" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26947"/>
        <reference ref_id="CVE-2024-26991" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-26991"/>
        <reference ref_id="CVE-2024-27022" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27022"/>
        <reference ref_id="CVE-2024-35895" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35895"/>
        <reference ref_id="CVE-2024-36016" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36016"/>
        <reference ref_id="CVE-2024-36899" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-36899"/>
        <reference ref_id="CVE-2024-38562" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38562"/>
        <reference ref_id="CVE-2024-38570" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38570"/>
        <reference ref_id="CVE-2024-38573" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38573"/>
        <reference ref_id="CVE-2024-38601" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38601"/>
        <reference ref_id="CVE-2024-38615" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38615"/>
        <reference ref_id="CVE-2024-40984" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-40984"/>
        <reference ref_id="CVE-2024-41071" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-41071"/>
        <reference ref_id="CVE-2024-42225" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42225"/>
        <reference ref_id="CVE-2024-42246" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42246"/>
        <reference ref_id="RHSA-2024:6997" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:6997"/>
        <reference ref_id="ALSA-2024:6997" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-6997.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
  * kernel: net/sched: act_mirred: don't override retval if we already lost the skb (CVE-2024-26739)
  * kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses (CVE-2024-26947)
  * kernel: scsi: qla2xxx: Fix command flush on cable pull (CVE-2024-26931)
  * kernel: scsi: qla2xxx: Fix double free of the ha-&amp;gt;vp_map pointer (CVE-2024-26930)
  * kernel: scsi: qla2xxx: Fix double free of fcport (CVE-2024-26929)
  * kernel: fork: defer linking file vma until vma is fully initialized (CVE-2024-27022)
  * kernel: KVM: x86/mmu: x86: Don&amp;#39;t overflow lpage_info when checking attributes (CVE-2024-26991)
  * kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem (CVE-2024-35895)
  * kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (CVE-2024-36016)
  * kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (CVE-2024-36899)
  * kernel: cpufreq: exit() callback is optional (CVE-2024-38615)
  * kernel: ring-buffer: Fix a race between readers and resize checks (CVE-2024-38601)
  * kernel: cppc_cpufreq: Fix possible null pointer dereference (CVE-2024-38573)
  * kernel: gfs2: Fix potential glock use-after-free on unmount (CVE-2024-38570)
  * kernel: wifi: nl80211: Avoid address calculations via out of bounds array indexing (CVE-2024-38562)
  * kernel: Input: cyapa - add missing input core locking to suspend/resume functions (CVE-2023-52884)
  * kernel: ACPICA: Revert &amp;#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&amp;#34; (CVE-2024-40984)
  * kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing (CVE-2024-41071)
  * kernel: wifi: mt76: replace skb_put with skb_put_zero (CVE-2024-42225)
  * kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (CVE-2024-42246)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-09-24"/>
          <updated date="2024-09-24"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265271" id="2265271"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2273270" id="2273270"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278167" id="2278167"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278245" id="2278245"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278248" id="2278248"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278250" id="2278250"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278252" id="2278252"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2278318" id="2278318"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2281677" id="2281677"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2283894" id="2283894"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2284549" id="2284549"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293348" id="2293348"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293364" id="2293364"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293420" id="2293420"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293423" id="2293423"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293431" id="2293431"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2293685" id="2293685"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297568" id="2297568"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2300448" id="2300448"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2301543" id="2301543"></bugzilla>
          <cve public="20240220" href="https://access.redhat.com/security/cve/CVE-2023-52439" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-52439</cve>
          <cve public="20240621" href="https://access.redhat.com/security/cve/CVE-2023-52884" impact="Low" cwe="CWE-667" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2023-52884</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-26739" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26739</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26929" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26929</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26930" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26930</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26931" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26931</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26947" impact="Moderate" cwe="CWE-439" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26947</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-26991" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-26991</cve>
          <cve public="20240501" href="https://access.redhat.com/security/cve/CVE-2024-27022" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27022</cve>
          <cve public="20240519" href="https://access.redhat.com/security/cve/CVE-2024-35895" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-35895</cve>
          <cve public="20240529" href="https://access.redhat.com/security/cve/CVE-2024-36016" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36016</cve>
          <cve public="20240530" href="https://access.redhat.com/security/cve/CVE-2024-36899" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H">CVE-2024-36899</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38562" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H">CVE-2024-38562</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38570" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-38570</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38573" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38573</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38601" impact="Low" cwe="CWE-362" cvss3="CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38601</cve>
          <cve public="20240619" href="https://access.redhat.com/security/cve/CVE-2024-38615" impact="Low" cwe="CWE-459" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38615</cve>
          <cve public="20240712" href="https://access.redhat.com/security/cve/CVE-2024-40984" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-40984</cve>
          <cve public="20240729" href="https://access.redhat.com/security/cve/CVE-2024-41071" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-41071</cve>
          <cve public="20240730" href="https://access.redhat.com/security/cve/CVE-2024-42225" impact="Moderate" cwe="CWE-457" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-42225</cve>
          <cve public="20240807" href="https://access.redhat.com/security/cve/CVE-2024-42246" impact="Low" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42246</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997001" comment="bpftool is earlier than 0:7.3.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997002" comment="kernel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997003" comment="kernel-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997004" comment="kernel-debug is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997005" comment="kernel-debug-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997006" comment="kernel-debug-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997008" comment="kernel-debug-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997012" comment="kernel-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997013" comment="kernel-devel-matched is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997014" comment="kernel-headers is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997015" comment="kernel-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997016" comment="kernel-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997017" comment="kernel-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997018" comment="kernel-tools is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997019" comment="kernel-tools-libs is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997020" comment="kernel-uki-virt is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997021" comment="perf is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997022" comment="python3-perf is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997023" comment="rtla is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997024" comment="rv is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997025" comment="kernel-zfcpdump is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997026" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997027" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997032" comment="kernel-rt is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997033" comment="kernel-rt-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997034" comment="kernel-rt-debug is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997035" comment="kernel-rt-debug-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997036" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997037" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997038" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997039" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997040" comment="kernel-rt-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997041" comment="kernel-rt-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997042" comment="kernel-rt-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997043" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997044" comment="kernel-64k is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997045" comment="kernel-64k-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997046" comment="kernel-64k-debug is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997047" comment="kernel-64k-debug-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997048" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997049" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997050" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997051" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997052" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997053" comment="kernel-64k-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997054" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997055" comment="kernel-64k-modules is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997056" comment="kernel-64k-modules-core is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997057" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997058" comment="kernel-cross-headers is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997059" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997060" comment="libperf is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997061" comment="kernel-abi-stablelists is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246997062" comment="kernel-doc is earlier than 0:5.14.0-427.37.1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242560" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2560: libvirt security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:2560" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2560"/>
        <reference ref_id="CVE-2024-1441" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1441"/>
        <reference ref_id="CVE-2024-2494" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2494"/>
        <reference ref_id="ALSA-2024:2560" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2560.html"/>
        <description>The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.

Security Fixes:

* libvirt: off-by-one error in udevListInterfacesByStatus() (CVE-2024-1441)
* libvirt: negative g_new0 length can lead to unbounded memory allocation (CVE-2024-2494)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fixes:

* libvirt: off-by-one error in udevListInterfacesByStatus() [almalinux-9] (JIRA:AlmaLinux-25081)
* libvirt: negative g_new0 length can lead to unbounded memory allocation [almalinux-9] (JIRA:AlmaLinux-29515)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263841" id="2263841"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270115" id="2270115"></bugzilla>
          <cve public="20240301" href="https://access.redhat.com/security/cve/CVE-2024-1441" impact="Moderate" cwe="CWE-193" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1441</cve>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-2494" impact="Moderate" cwe="CWE-789" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-2494</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560062" comment="libvirt is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757063" comment="libvirt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560063" comment="libvirt-client is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757065" comment="libvirt-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560064" comment="libvirt-client-qemu is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757067" comment="libvirt-client-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560065" comment="libvirt-daemon is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757069" comment="libvirt-daemon is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560066" comment="libvirt-daemon-common is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757071" comment="libvirt-daemon-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560067" comment="libvirt-daemon-config-network is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757073" comment="libvirt-daemon-config-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560068" comment="libvirt-daemon-config-nwfilter is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757075" comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560069" comment="libvirt-daemon-driver-interface is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757077" comment="libvirt-daemon-driver-interface is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560070" comment="libvirt-daemon-driver-network is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757079" comment="libvirt-daemon-driver-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560071" comment="libvirt-daemon-driver-nodedev is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757081" comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560072" comment="libvirt-daemon-driver-nwfilter is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757083" comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560073" comment="libvirt-daemon-driver-qemu is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757085" comment="libvirt-daemon-driver-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560074" comment="libvirt-daemon-driver-secret is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757087" comment="libvirt-daemon-driver-secret is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560075" comment="libvirt-daemon-driver-storage is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757089" comment="libvirt-daemon-driver-storage is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560076" comment="libvirt-daemon-driver-storage-core is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757091" comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560077" comment="libvirt-daemon-driver-storage-disk is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757093" comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560078" comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757095" comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560079" comment="libvirt-daemon-driver-storage-logical is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757097" comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560080" comment="libvirt-daemon-driver-storage-mpath is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757099" comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560081" comment="libvirt-daemon-driver-storage-rbd is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757101" comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560082" comment="libvirt-daemon-driver-storage-scsi is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757103" comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560083" comment="libvirt-daemon-kvm is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757105" comment="libvirt-daemon-kvm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560084" comment="libvirt-daemon-lock is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757107" comment="libvirt-daemon-lock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560085" comment="libvirt-daemon-log is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757109" comment="libvirt-daemon-log is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560086" comment="libvirt-daemon-plugin-lockd is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757111" comment="libvirt-daemon-plugin-lockd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560087" comment="libvirt-daemon-plugin-sanlock is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757113" comment="libvirt-daemon-plugin-sanlock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560088" comment="libvirt-daemon-proxy is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757115" comment="libvirt-daemon-proxy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560089" comment="libvirt-devel is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757117" comment="libvirt-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560090" comment="libvirt-docs is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757119" comment="libvirt-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560091" comment="libvirt-libs is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757121" comment="libvirt-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242560092" comment="libvirt-nss is earlier than 0:10.0.0-6.2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757123" comment="libvirt-nss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242562" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2562: golang security update (Important)</title>
        <reference ref_id="RHSA-2024:2562" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2562"/>
        <reference ref_id="CVE-2023-45288" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45288"/>
        <reference ref_id="CVE-2023-45289" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45289"/>
        <reference ref_id="CVE-2023-45290" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45290"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="CVE-2024-24783" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24783"/>
        <reference ref_id="CVE-2024-24784" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24784"/>
        <reference ref_id="CVE-2024-24785" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24785"/>
        <reference ref_id="ALSA-2024:2562" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2562.html"/>
        <description>The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268017" id="2268017"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268018" id="2268018"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268019" id="2268019"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268021" id="2268021"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268022" id="2268022"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268273" id="2268273"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2023-45288" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2023-45288</cve>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2023-45289" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2023-45289</cve>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2023-45290" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-45290</cve>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2024-24783" impact="Moderate" cwe="CWE-20-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-24783</cve>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2024-24784" impact="Moderate" cwe="CWE-115" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N">CVE-2024-24784</cve>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2024-24785" impact="Moderate" cwe="CWE-74" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N">CVE-2024-24785</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562001" comment="go-toolset is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562003" comment="golang is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562005" comment="golang-bin is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562007" comment="golang-docs is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562009" comment="golang-misc is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562011" comment="golang-src is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242562013" comment="golang-tests is earlier than 0:1.21.9-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242565" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2565: libreswan security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2565" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2565"/>
        <reference ref_id="CVE-2024-2357" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2357"/>
        <reference ref_id="ALSA-2024:2565" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2565.html"/>
        <description>Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).

Security Fix(es):

* libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268952" id="2268952"></bugzilla>
          <cve public="20240311" href="https://access.redhat.com/security/cve/CVE-2024-2357" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2024-2357</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242565002" comment="libreswan is earlier than 0:4.12-2.el9_4.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244050002" comment="libreswan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242566" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2566: pcp security, bug fix, and enhancement update (Important)</title>
        <reference ref_id="RHSA-2024:2566" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2566"/>
        <reference ref_id="CVE-2024-3019" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3019"/>
        <reference ref_id="ALSA-2024:2566" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2566.html"/>
        <description>Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.

Security Fix(es):

* pcp: exposure of the redis server backend allows remote command execution via pmproxy (CVE-2024-3019)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2271898" id="2271898"></bugzilla>
          <cve public="20240327" href="https://access.redhat.com/security/cve/CVE-2024-3019" impact="Important" cwe="CWE-668" cvss3="CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2024-3019</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566001" comment="pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213002" comment="pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566003" comment="pcp-conf is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213004" comment="pcp-conf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566208" comment="pcp-devel is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213006" comment="pcp-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566009" comment="pcp-export-pcp2elasticsearch is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213010" comment="pcp-export-pcp2elasticsearch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566011" comment="pcp-export-pcp2graphite is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213012" comment="pcp-export-pcp2graphite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566013" comment="pcp-export-pcp2influxdb is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213014" comment="pcp-export-pcp2influxdb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566015" comment="pcp-export-pcp2json is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213016" comment="pcp-export-pcp2json is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566017" comment="pcp-export-pcp2spark is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213018" comment="pcp-export-pcp2spark is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566019" comment="pcp-export-pcp2xml is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213020" comment="pcp-export-pcp2xml is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566021" comment="pcp-export-pcp2zabbix is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213022" comment="pcp-export-pcp2zabbix is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566023" comment="pcp-export-zabbix-agent is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213024" comment="pcp-export-zabbix-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566025" comment="pcp-geolocate is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213026" comment="pcp-geolocate is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566027" comment="pcp-gui is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213028" comment="pcp-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566029" comment="pcp-import-collectl2pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213030" comment="pcp-import-collectl2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566031" comment="pcp-import-ganglia2pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213032" comment="pcp-import-ganglia2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566033" comment="pcp-import-iostat2pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213034" comment="pcp-import-iostat2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566035" comment="pcp-import-mrtg2pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213036" comment="pcp-import-mrtg2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566037" comment="pcp-import-sar2pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213038" comment="pcp-import-sar2pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566209" comment="pcp-libs is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213040" comment="pcp-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566210" comment="pcp-libs-devel is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213042" comment="pcp-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566043" comment="pcp-pmda-activemq is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213044" comment="pcp-pmda-activemq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566045" comment="pcp-pmda-apache is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213046" comment="pcp-pmda-apache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566047" comment="pcp-pmda-bash is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213048" comment="pcp-pmda-bash is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566049" comment="pcp-pmda-bcc is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213050" comment="pcp-pmda-bcc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566051" comment="pcp-pmda-bind2 is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213052" comment="pcp-pmda-bind2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566053" comment="pcp-pmda-bonding is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213054" comment="pcp-pmda-bonding is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566211" comment="pcp-pmda-bpf is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213056" comment="pcp-pmda-bpf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566057" comment="pcp-pmda-bpftrace is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213058" comment="pcp-pmda-bpftrace is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566059" comment="pcp-pmda-cifs is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213060" comment="pcp-pmda-cifs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566061" comment="pcp-pmda-cisco is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213062" comment="pcp-pmda-cisco is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566063" comment="pcp-pmda-dbping is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213064" comment="pcp-pmda-dbping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566065" comment="pcp-pmda-denki is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213066" comment="pcp-pmda-denki is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566067" comment="pcp-pmda-dm is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213068" comment="pcp-pmda-dm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566069" comment="pcp-pmda-docker is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213070" comment="pcp-pmda-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566071" comment="pcp-pmda-ds389 is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213072" comment="pcp-pmda-ds389 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566073" comment="pcp-pmda-ds389log is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213074" comment="pcp-pmda-ds389log is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566075" comment="pcp-pmda-elasticsearch is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213076" comment="pcp-pmda-elasticsearch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566077" comment="pcp-pmda-farm is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213078" comment="pcp-pmda-farm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566079" comment="pcp-pmda-gfs2 is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213080" comment="pcp-pmda-gfs2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566081" comment="pcp-pmda-gluster is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213082" comment="pcp-pmda-gluster is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566083" comment="pcp-pmda-gpfs is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213084" comment="pcp-pmda-gpfs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566085" comment="pcp-pmda-gpsd is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213086" comment="pcp-pmda-gpsd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566087" comment="pcp-pmda-hacluster is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213088" comment="pcp-pmda-hacluster is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566089" comment="pcp-pmda-haproxy is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213090" comment="pcp-pmda-haproxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566212" comment="pcp-pmda-infiniband is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213092" comment="pcp-pmda-infiniband is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566093" comment="pcp-pmda-json is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213094" comment="pcp-pmda-json is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566095" comment="pcp-pmda-libvirt is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213096" comment="pcp-pmda-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566097" comment="pcp-pmda-lio is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213098" comment="pcp-pmda-lio is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566099" comment="pcp-pmda-lmsensors is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213100" comment="pcp-pmda-lmsensors is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566101" comment="pcp-pmda-logger is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213102" comment="pcp-pmda-logger is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566103" comment="pcp-pmda-lustre is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213104" comment="pcp-pmda-lustre is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566105" comment="pcp-pmda-lustrecomm is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213106" comment="pcp-pmda-lustrecomm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566107" comment="pcp-pmda-mailq is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213108" comment="pcp-pmda-mailq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566109" comment="pcp-pmda-memcache is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213110" comment="pcp-pmda-memcache is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566111" comment="pcp-pmda-mic is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213112" comment="pcp-pmda-mic is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566113" comment="pcp-pmda-mongodb is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213114" comment="pcp-pmda-mongodb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566115" comment="pcp-pmda-mounts is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213116" comment="pcp-pmda-mounts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566213" comment="pcp-pmda-mssql is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213118" comment="pcp-pmda-mssql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566119" comment="pcp-pmda-mysql is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213120" comment="pcp-pmda-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566121" comment="pcp-pmda-named is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213122" comment="pcp-pmda-named is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566123" comment="pcp-pmda-netcheck is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213124" comment="pcp-pmda-netcheck is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566125" comment="pcp-pmda-netfilter is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213126" comment="pcp-pmda-netfilter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566127" comment="pcp-pmda-news is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213128" comment="pcp-pmda-news is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566129" comment="pcp-pmda-nfsclient is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213130" comment="pcp-pmda-nfsclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566131" comment="pcp-pmda-nginx is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213132" comment="pcp-pmda-nginx is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566133" comment="pcp-pmda-nvidia-gpu is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213134" comment="pcp-pmda-nvidia-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566135" comment="pcp-pmda-openmetrics is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213136" comment="pcp-pmda-openmetrics is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566137" comment="pcp-pmda-openvswitch is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213138" comment="pcp-pmda-openvswitch is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566139" comment="pcp-pmda-oracle is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213140" comment="pcp-pmda-oracle is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566141" comment="pcp-pmda-pdns is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213142" comment="pcp-pmda-pdns is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566214" comment="pcp-pmda-perfevent is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213144" comment="pcp-pmda-perfevent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566145" comment="pcp-pmda-podman is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213146" comment="pcp-pmda-podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566147" comment="pcp-pmda-postfix is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213148" comment="pcp-pmda-postfix is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566149" comment="pcp-pmda-postgresql is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213150" comment="pcp-pmda-postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566151" comment="pcp-pmda-rabbitmq is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213152" comment="pcp-pmda-rabbitmq is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566153" comment="pcp-pmda-redis is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213154" comment="pcp-pmda-redis is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566215" comment="pcp-pmda-resctrl is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213156" comment="pcp-pmda-resctrl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566157" comment="pcp-pmda-roomtemp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213158" comment="pcp-pmda-roomtemp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566159" comment="pcp-pmda-rsyslog is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213160" comment="pcp-pmda-rsyslog is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566161" comment="pcp-pmda-samba is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213162" comment="pcp-pmda-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566163" comment="pcp-pmda-sendmail is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213164" comment="pcp-pmda-sendmail is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566165" comment="pcp-pmda-shping is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213166" comment="pcp-pmda-shping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566167" comment="pcp-pmda-slurm is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213168" comment="pcp-pmda-slurm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566169" comment="pcp-pmda-smart is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213170" comment="pcp-pmda-smart is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566171" comment="pcp-pmda-snmp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213172" comment="pcp-pmda-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566173" comment="pcp-pmda-sockets is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213174" comment="pcp-pmda-sockets is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566175" comment="pcp-pmda-statsd is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213176" comment="pcp-pmda-statsd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566177" comment="pcp-pmda-summary is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213178" comment="pcp-pmda-summary is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566179" comment="pcp-pmda-systemd is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213180" comment="pcp-pmda-systemd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566181" comment="pcp-pmda-trace is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213182" comment="pcp-pmda-trace is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566183" comment="pcp-pmda-unbound is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213184" comment="pcp-pmda-unbound is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566185" comment="pcp-pmda-weblog is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213186" comment="pcp-pmda-weblog is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566187" comment="pcp-pmda-zimbra is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213188" comment="pcp-pmda-zimbra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566189" comment="pcp-pmda-zswap is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213190" comment="pcp-pmda-zswap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566191" comment="pcp-selinux is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213192" comment="pcp-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566193" comment="pcp-system-tools is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213194" comment="pcp-system-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566216" comment="pcp-testsuite is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213196" comment="pcp-testsuite is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566197" comment="pcp-zeroconf is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213198" comment="pcp-zeroconf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566199" comment="perl-PCP-LogImport is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213200" comment="perl-PCP-LogImport is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566201" comment="perl-PCP-LogSummary is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213202" comment="perl-PCP-LogSummary is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566203" comment="perl-PCP-MMV is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213204" comment="perl-PCP-MMV is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566205" comment="perl-PCP-PMDA is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213206" comment="perl-PCP-PMDA is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566207" comment="python3-pcp is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213208" comment="python3-pcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242566007" comment="pcp-doc is earlier than 0:6.2.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242213008" comment="pcp-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242568" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2568: grafana security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2568" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2568"/>
        <reference ref_id="CVE-2024-1313" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1313"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:2568" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2568.html"/>
        <description>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB.

Security Fix(es):

* grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* grafana: vulnerable to authorization bypass (CVE-2024-1313)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271903" id="2271903"></bugzilla>
          <cve public="20240326" href="https://access.redhat.com/security/cve/CVE-2024-1313" impact="Moderate" cwe="CWE-639" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N">CVE-2024-1313</cve>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242568005" comment="grafana is earlier than 0:9.2.10-16.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225716002" comment="grafana is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242568006" comment="grafana-selinux is earlier than 0:9.2.10-16.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242568004" comment="grafana-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242569" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2569: grafana-pcp security update (Important)</title>
        <reference ref_id="RHSA-2024:2569" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2569"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:2569" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2569.html"/>
        <description>grafana-pcp is an open source Grafana plugin for PCP.

Security Fix(es):

* grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20242569002" comment="grafana-pcp is earlier than 0:5.1.1-2.el9_4.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20246946002" comment="grafana-pcp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242570" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2570: gnutls security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2570" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2570"/>
        <reference ref_id="CVE-2024-28834" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28834"/>
        <reference ref_id="CVE-2024-28835" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28835"/>
        <reference ref_id="ALSA-2024:2570" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2570.html"/>
        <description>The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.

Security Fix(es):

* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
* gnutls: potential crash during chain building/verification (CVE-2024-28835)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2269084" id="2269084"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269228" id="2269228"></bugzilla>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-28834" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N">CVE-2024-28834</cve>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-28835" impact="Moderate" cwe="CWE-248" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H">CVE-2024-28835</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242570001" comment="gnutls is earlier than 0:3.8.3-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854002" comment="gnutls is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242570003" comment="gnutls-c++ is earlier than 0:3.8.3-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854004" comment="gnutls-c++ is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242570005" comment="gnutls-dane is earlier than 0:3.8.3-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854006" comment="gnutls-dane is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242570007" comment="gnutls-devel is earlier than 0:3.8.3-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854008" comment="gnutls-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242570010" comment="gnutls-utils is earlier than 0:3.8.3-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226854010" comment="gnutls-utils is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242571" version="642" class="patch">
      <metadata>
        <title>ALSA-2024:2571: sssd security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:2571" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2571"/>
        <reference ref_id="CVE-2023-3758" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-3758"/>
        <reference ref_id="ALSA-2024:2571" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2571.html"/>
        <description>The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.

Security Fix(es):

* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)

Bug Fix(es):

* socket leak (JIRA:AlmaLinux-22340)
* Passkey cannot fall back to password (JIRA:AlmaLinux-28161)
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:AlmaLinux-27209)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2223762" id="2223762"></bugzilla>
          <cve public="20240416" href="https://access.redhat.com/security/cve/CVE-2023-3758" impact="Moderate" cwe="CWE-362-&gt;CWE-285" cvss3="CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2023-3758</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571001" comment="libipa_hbac is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571002" comment="libipa_hbac is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571063" comment="libsss_autofs is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571004" comment="libsss_autofs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571005" comment="libsss_certmap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571006" comment="libsss_certmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571007" comment="libsss_idmap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571008" comment="libsss_idmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571009" comment="libsss_nss_idmap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571010" comment="libsss_nss_idmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571011" comment="libsss_nss_idmap-devel is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571012" comment="libsss_nss_idmap-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571013" comment="libsss_simpleifp is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571014" comment="libsss_simpleifp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571064" comment="libsss_sudo is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571016" comment="libsss_sudo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571065" comment="python3-libipa_hbac is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571018" comment="python3-libipa_hbac is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571066" comment="python3-libsss_nss_idmap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571020" comment="python3-libsss_nss_idmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571067" comment="python3-sss is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571022" comment="python3-sss is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571068" comment="python3-sss-murmur is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571024" comment="python3-sss-murmur is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571069" comment="sssd is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571028" comment="sssd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571070" comment="sssd-ad is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571030" comment="sssd-ad is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571031" comment="sssd-client is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571032" comment="sssd-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571071" comment="sssd-common is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571034" comment="sssd-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571072" comment="sssd-common-pac is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571036" comment="sssd-common-pac is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571073" comment="sssd-dbus is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571038" comment="sssd-dbus is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571074" comment="sssd-idp is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571040" comment="sssd-idp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571075" comment="sssd-ipa is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571042" comment="sssd-ipa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571076" comment="sssd-kcm is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571044" comment="sssd-kcm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571077" comment="sssd-krb5 is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571046" comment="sssd-krb5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571078" comment="sssd-krb5-common is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571048" comment="sssd-krb5-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571079" comment="sssd-ldap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571050" comment="sssd-ldap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571080" comment="sssd-nfs-idmap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571052" comment="sssd-nfs-idmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571081" comment="sssd-passkey is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571054" comment="sssd-passkey is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571082" comment="sssd-polkit-rules is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571056" comment="sssd-polkit-rules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571083" comment="sssd-proxy is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571058" comment="sssd-proxy is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571084" comment="sssd-tools is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571060" comment="sssd-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571085" comment="sssd-winbind-idmap is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571062" comment="sssd-winbind-idmap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571025" comment="python3-sssdconfig is earlier than 0:2.9.4-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242571026" comment="python3-sssdconfig is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242616" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2616: tigervnc security update (Important)</title>
        <reference ref_id="RHSA-2024:2616" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2616"/>
        <reference ref_id="CVE-2024-31080" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-31080"/>
        <reference ref_id="CVE-2024-31081" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-31081"/>
        <reference ref_id="CVE-2024-31083" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-31083"/>
        <reference ref_id="ALSA-2024:2616" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2616.html"/>
        <description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.

Security Fix(es):

* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2271997" id="2271997"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2271998" id="2271998"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2272000" id="2272000"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-31080" impact="Important" cwe="CWE-126" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2024-31080</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-31081" impact="Important" cwe="CWE-126" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H">CVE-2024-31081</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-31083" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-31083</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616001" comment="tigervnc is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622002" comment="tigervnc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616009" comment="tigervnc-server is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622010" comment="tigervnc-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616011" comment="tigervnc-server-minimal is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622012" comment="tigervnc-server-minimal is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616013" comment="tigervnc-server-module is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622014" comment="tigervnc-server-module is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616003" comment="tigervnc-icons is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622004" comment="tigervnc-icons is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616005" comment="tigervnc-license is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622006" comment="tigervnc-license is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242616007" comment="tigervnc-selinux is earlier than 0:1.13.1-8.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230622008" comment="tigervnc-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242679" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2679: libxml2 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:2679" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2679"/>
        <reference ref_id="CVE-2024-25062" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25062"/>
        <reference ref_id="ALSA-2024:2679" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2679.html"/>
        <description>The libxml2 library is a development toolbox providing the implementation of various XML standards.

Security Fix(es):

* libxml2: use-after-free in XMLReader (CVE-2024-25062)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-02"/>
          <updated date="2024-05-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262726" id="2262726"></bugzilla>
          <cve public="20240204" href="https://access.redhat.com/security/cve/CVE-2024-25062" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-25062</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242679001" comment="libxml2 is earlier than 0:2.9.13-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250002" comment="libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242679003" comment="libxml2-devel is earlier than 0:2.9.13-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250004" comment="libxml2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242679006" comment="python3-libxml2 is earlier than 0:2.9.13-6.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225250006" comment="python3-libxml2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242842" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:2842: .NET 8.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:2842" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2842"/>
        <reference ref_id="CVE-2024-30045" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-30045"/>
        <reference ref_id="CVE-2024-30046" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-30046"/>
        <reference ref_id="ALSA-2024:2842" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2842.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5.

Security Fix(es):

* dotnet: stack buffer overrun in Double Parse (CVE-2024-30045)
* dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-14"/>
          <updated date="2024-05-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2279695" id="2279695"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2279697" id="2279697"></bugzilla>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-30045" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2024-30045</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-30046" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-30046</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842028" comment="aspnetcore-runtime-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253002" comment="aspnetcore-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842003" comment="aspnetcore-runtime-dbg-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848004" comment="aspnetcore-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842029" comment="aspnetcore-targeting-pack-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253004" comment="aspnetcore-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842030" comment="dotnet-apphost-pack-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253006" comment="dotnet-apphost-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842009" comment="dotnet-host is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842031" comment="dotnet-hostfxr-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253010" comment="dotnet-hostfxr-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842032" comment="dotnet-runtime-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253012" comment="dotnet-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842015" comment="dotnet-runtime-dbg-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848016" comment="dotnet-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842033" comment="dotnet-sdk-8.0 is earlier than 0:8.0.105-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253014" comment="dotnet-sdk-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842034" comment="dotnet-sdk-8.0-source-built-artifacts is earlier than 0:8.0.105-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253016" comment="dotnet-sdk-8.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842021" comment="dotnet-sdk-dbg-8.0 is earlier than 0:8.0.105-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848022" comment="dotnet-sdk-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842035" comment="dotnet-targeting-pack-8.0 is earlier than 0:8.0.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253018" comment="dotnet-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842036" comment="dotnet-templates-8.0 is earlier than 0:8.0.105-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253020" comment="dotnet-templates-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242842027" comment="netstandard-targeting-pack-2.1 is earlier than 0:8.0.105-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242843" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:2843: .NET 7.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:2843" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2843"/>
        <reference ref_id="CVE-2024-30045" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-30045"/>
        <reference ref_id="CVE-2024-30046" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-30046"/>
        <reference ref_id="ALSA-2024:2843" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2843.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.119 and .NET Runtime 7.0.19.

Security Fix(es):

* dotnet: stack buffer overrun in Double Parse (CVE-2024-30045)
* dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-15"/>
          <updated date="2024-05-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2279695" id="2279695"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2279697" id="2279697"></bugzilla>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-30045" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2024-30045</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-30046" impact="Moderate" cwe="CWE-833" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-30046</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843001" comment="aspnetcore-runtime-7.0 is earlier than 0:7.0.19-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434002" comment="aspnetcore-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843003" comment="aspnetcore-targeting-pack-7.0 is earlier than 0:7.0.19-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434004" comment="aspnetcore-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843005" comment="dotnet-apphost-pack-7.0 is earlier than 0:7.0.19-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434006" comment="dotnet-apphost-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843007" comment="dotnet-hostfxr-7.0 is earlier than 0:7.0.19-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434010" comment="dotnet-hostfxr-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843009" comment="dotnet-runtime-7.0 is earlier than 0:7.0.19-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434012" comment="dotnet-runtime-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843011" comment="dotnet-sdk-7.0 is earlier than 0:7.0.119-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434014" comment="dotnet-sdk-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843013" comment="dotnet-sdk-7.0-source-built-artifacts is earlier than 0:7.0.119-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434016" comment="dotnet-sdk-7.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843015" comment="dotnet-targeting-pack-7.0 is earlier than 0:7.0.19-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434018" comment="dotnet-targeting-pack-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242843017" comment="dotnet-templates-7.0 is earlier than 0:7.0.119-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228434020" comment="dotnet-templates-7.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242853" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2853: nodejs:20 security update (Important)</title>
        <reference ref_id="RHSA-2024:2853" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2853"/>
        <reference ref_id="CVE-2024-22025" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-22025"/>
        <reference ref_id="CVE-2024-25629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25629"/>
        <reference ref_id="CVE-2024-27982" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27982"/>
        <reference ref_id="CVE-2024-27983" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27983"/>
        <reference ref_id="CVE-2024-28182" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28182"/>
        <reference ref_id="ALSA-2024:2853" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2853.html"/>
        <description>Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.

Security Fix(es):

* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)
* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)
* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)
* nodejs: CONTINUATION frames DoS (CVE-2024-27983)
* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-15"/>
          <updated date="2024-05-15"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265713" id="2265713"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268639" id="2268639"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270559" id="2270559"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2272764" id="2272764"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275392" id="2275392"></bugzilla>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-22025" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2024-22025</cve>
          <cve public="20240223" href="https://access.redhat.com/security/cve/CVE-2024-25629" impact="Low" cwe="CWE-127" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-25629</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-27982" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-27982</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-27983" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27983</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-28182" impact="Moderate" cwe="CWE-390" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28182</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241688024" comment="Module nodejs:20 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20242853016" comment="nodejs is earlier than 1:20.12.2-2.module_el9.4.0+100+71fc9528"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20242853017" comment="nodejs-devel is earlier than 1:20.12.2-2.module_el9.4.0+100+71fc9528"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832004" comment="nodejs-devel is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20242853018" comment="nodejs-full-i18n is earlier than 1:20.12.2-2.module_el9.4.0+100+71fc9528"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20242853019" comment="npm is earlier than 1:10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20242853020" comment="nodejs-docs is earlier than 1:20.12.2-2.module_el9.4.0+100+71fc9528"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241688021" comment="nodejs-nodemon is earlier than 0:3.0.1-1.module_el9.3.0+47+c33bc288"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20226595012" comment="nodejs-nodemon is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241688022" comment="nodejs-packaging is earlier than 0:2021.06-4.module_el9.3.0+88+29afeaa2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832012" comment="nodejs-packaging is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241688023" comment="nodejs-packaging-bundler is earlier than 0:2021.06-4.module_el9.3.0+88+29afeaa2"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20228832014" comment="nodejs-packaging-bundler is signed with AlmaLinux OS 9 key"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242883" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2883: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:2883" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2883"/>
        <reference ref_id="CVE-2024-4367" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4367"/>
        <reference ref_id="CVE-2024-4767" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4767"/>
        <reference ref_id="CVE-2024-4768" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4768"/>
        <reference ref_id="CVE-2024-4769" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4769"/>
        <reference ref_id="CVE-2024-4770" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4770"/>
        <reference ref_id="CVE-2024-4777" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4777"/>
        <reference ref_id="ALSA-2024:2883" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2883.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.11.0 ESR.

Security Fix(es):
  

* firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)
* firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)
* firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)
* firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769)
* firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)
* firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-16"/>
          <updated date="2024-05-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2280382" id="2280382"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280383" id="2280383"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280384" id="2280384"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280385" id="2280385"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280386" id="2280386"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280387" id="2280387"></bugzilla>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-4367" impact="Important" cwe="CWE-754" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-4367</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-4767" impact="Moderate" cwe="CWE-212" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-4767</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-4768" impact="Moderate" cwe="CWE-451" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-4768</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-4769" impact="Moderate" cwe="CWE-829" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-4769</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-4770" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-4770</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-4777" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-4777</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242883004" comment="firefox is earlier than 0:115.11.0-1.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242883005" comment="firefox-x11 is earlier than 0:115.11.0-1.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242910" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:2910: nodejs security update (Important)</title>
        <reference ref_id="RHSA-2024:2910" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2910"/>
        <reference ref_id="CVE-2024-22025" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-22025"/>
        <reference ref_id="CVE-2024-25629" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-25629"/>
        <reference ref_id="CVE-2024-27982" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27982"/>
        <reference ref_id="CVE-2024-27983" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27983"/>
        <reference ref_id="CVE-2024-28182" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28182"/>
        <reference ref_id="ALSA-2024:2910" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2910.html"/>
        <description>Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. 

Security Fix(es):

* nodejs: CONTINUATION frames DoS (CVE-2024-27983)
* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)
* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)
* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)
* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-20"/>
          <updated date="2024-05-20"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2265713" id="2265713"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268639" id="2268639"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270559" id="2270559"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2272764" id="2272764"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2275392" id="2275392"></bugzilla>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-22025" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVE-2024-22025</cve>
          <cve public="20240223" href="https://access.redhat.com/security/cve/CVE-2024-25629" impact="Low" cwe="CWE-127" cvss3="CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H">CVE-2024-25629</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-27982" impact="Moderate" cwe="CWE-444" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-27982</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-27983" impact="Important" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-27983</cve>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-28182" impact="Moderate" cwe="CWE-390" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28182</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242910010" comment="nodejs is earlier than 1:16.20.2-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595002" comment="nodejs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242910011" comment="nodejs-full-i18n is earlier than 1:16.20.2-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595006" comment="nodejs-full-i18n is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242910012" comment="nodejs-libs is earlier than 1:16.20.2-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595008" comment="nodejs-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242910013" comment="npm is earlier than 1:8.19.4-1.16.20.2.8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595010" comment="npm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242910014" comment="nodejs-docs is earlier than 1:16.20.2-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226595004" comment="nodejs-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243307" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:3307: tomcat security and bug fix update (Important)</title>
        <reference ref_id="RHSA-2024:3307" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3307"/>
        <reference ref_id="CVE-2024-23672" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-23672"/>
        <reference ref_id="CVE-2024-24549" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24549"/>
        <reference ref_id="ALSA-2024:3307" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3307.html"/>
        <description>Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.

Security Fix(es):

* Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)
* Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672)

Bug Fix(es) and Enhancement(s):

* Rebase tomcat to version 9.0.87 (JIRA:AlmaLinux-34815)
* Amend tomcat's changelog so that fixed CVEs are mentioned explicitly (JIRA:AlmaLinux-35328)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-23"/>
          <updated date="2024-05-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2269607" id="2269607"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2269608" id="2269608"></bugzilla>
          <cve public="20240313" href="https://access.redhat.com/security/cve/CVE-2024-23672" impact="Important" cwe="CWE-459" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-23672</cve>
          <cve public="20240313" href="https://access.redhat.com/security/cve/CVE-2024-24549" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-24549</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307001" comment="tomcat is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929002" comment="tomcat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307003" comment="tomcat-admin-webapps is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929004" comment="tomcat-admin-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307005" comment="tomcat-docs-webapp is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929006" comment="tomcat-docs-webapp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307007" comment="tomcat-el-3.0-api is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929008" comment="tomcat-el-3.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307009" comment="tomcat-jsp-2.3-api is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929010" comment="tomcat-jsp-2.3-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307011" comment="tomcat-lib is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929012" comment="tomcat-lib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307013" comment="tomcat-servlet-4.0-api is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929014" comment="tomcat-servlet-4.0-api is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243307015" comment="tomcat-webapps is earlier than 1:9.0.87-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235929016" comment="tomcat-webapps is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243339" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:3339: glibc security update (Important)</title>
        <reference ref_id="RHSA-2024:3339" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3339"/>
        <reference ref_id="CVE-2024-2961" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2961"/>
        <reference ref_id="CVE-2024-33599" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-33599"/>
        <reference ref_id="CVE-2024-33600" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-33600"/>
        <reference ref_id="CVE-2024-33601" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-33601"/>
        <reference ref_id="CVE-2024-33602" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-33602"/>
        <reference ref_id="ALSA-2024:3339" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3339.html"/>
        <description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

* glibc: Out of bounds write in iconv conversion to ISO-2022-CN-EXT
(CVE-2024-2961)
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)
* glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-23"/>
          <updated date="2024-05-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2273404" id="2273404"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277202" id="2277202"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277204" id="2277204"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277205" id="2277205"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2277206" id="2277206"></bugzilla>
          <cve public="20240417" href="https://access.redhat.com/security/cve/CVE-2024-2961" impact="Important" cwe="CWE-787" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-2961</cve>
          <cve public="20240423" href="https://access.redhat.com/security/cve/CVE-2024-33599" impact="Important" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H">CVE-2024-33599</cve>
          <cve public="20240424" href="https://access.redhat.com/security/cve/CVE-2024-33600" impact="Moderate" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-33600</cve>
          <cve public="20240424" href="https://access.redhat.com/security/cve/CVE-2024-33601" impact="Low" cwe="CWE-703" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-33601</cve>
          <cve public="20240424" href="https://access.redhat.com/security/cve/CVE-2024-33602" impact="Low" cwe="CWE-703" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-33602</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339001" comment="glibc is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339430" comment="glibc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339431" comment="glibc-all-langpacks is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339432" comment="glibc-all-langpacks is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339433" comment="glibc-benchtests is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339434" comment="glibc-benchtests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339435" comment="glibc-common is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339436" comment="glibc-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339009" comment="glibc-devel is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339437" comment="glibc-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339013" comment="glibc-gconv-extra is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339438" comment="glibc-gconv-extra is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339439" comment="glibc-headers is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339440" comment="glibc-headers is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339441" comment="glibc-langpack-aa is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339442" comment="glibc-langpack-aa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339443" comment="glibc-langpack-af is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339444" comment="glibc-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339445" comment="glibc-langpack-agr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339446" comment="glibc-langpack-agr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339447" comment="glibc-langpack-ak is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339448" comment="glibc-langpack-ak is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339449" comment="glibc-langpack-am is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339450" comment="glibc-langpack-am is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339451" comment="glibc-langpack-an is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339452" comment="glibc-langpack-an is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339453" comment="glibc-langpack-anp is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339454" comment="glibc-langpack-anp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339455" comment="glibc-langpack-ar is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339456" comment="glibc-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339457" comment="glibc-langpack-as is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339458" comment="glibc-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339459" comment="glibc-langpack-ast is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339460" comment="glibc-langpack-ast is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339461" comment="glibc-langpack-ayc is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339462" comment="glibc-langpack-ayc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339463" comment="glibc-langpack-az is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339464" comment="glibc-langpack-az is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339465" comment="glibc-langpack-be is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339466" comment="glibc-langpack-be is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339467" comment="glibc-langpack-bem is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339468" comment="glibc-langpack-bem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339469" comment="glibc-langpack-ber is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339470" comment="glibc-langpack-ber is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339471" comment="glibc-langpack-bg is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339472" comment="glibc-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339473" comment="glibc-langpack-bhb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339474" comment="glibc-langpack-bhb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339475" comment="glibc-langpack-bho is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339476" comment="glibc-langpack-bho is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339477" comment="glibc-langpack-bi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339478" comment="glibc-langpack-bi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339479" comment="glibc-langpack-bn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339480" comment="glibc-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339481" comment="glibc-langpack-bo is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339482" comment="glibc-langpack-bo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339483" comment="glibc-langpack-br is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339484" comment="glibc-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339485" comment="glibc-langpack-brx is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339486" comment="glibc-langpack-brx is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339487" comment="glibc-langpack-bs is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339488" comment="glibc-langpack-bs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339489" comment="glibc-langpack-byn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339490" comment="glibc-langpack-byn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339491" comment="glibc-langpack-ca is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339492" comment="glibc-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339493" comment="glibc-langpack-ce is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339494" comment="glibc-langpack-ce is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339495" comment="glibc-langpack-chr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339496" comment="glibc-langpack-chr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339497" comment="glibc-langpack-ckb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339498" comment="glibc-langpack-ckb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339499" comment="glibc-langpack-cmn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339500" comment="glibc-langpack-cmn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339501" comment="glibc-langpack-crh is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339502" comment="glibc-langpack-crh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339503" comment="glibc-langpack-cs is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339504" comment="glibc-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339505" comment="glibc-langpack-csb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339506" comment="glibc-langpack-csb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339507" comment="glibc-langpack-cv is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339508" comment="glibc-langpack-cv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339509" comment="glibc-langpack-cy is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339510" comment="glibc-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339511" comment="glibc-langpack-da is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339512" comment="glibc-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339513" comment="glibc-langpack-de is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339514" comment="glibc-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339515" comment="glibc-langpack-doi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339516" comment="glibc-langpack-doi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339517" comment="glibc-langpack-dsb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339518" comment="glibc-langpack-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339519" comment="glibc-langpack-dv is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339520" comment="glibc-langpack-dv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339521" comment="glibc-langpack-dz is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339522" comment="glibc-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339523" comment="glibc-langpack-el is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339524" comment="glibc-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339525" comment="glibc-langpack-en is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339526" comment="glibc-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339527" comment="glibc-langpack-eo is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339528" comment="glibc-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339529" comment="glibc-langpack-es is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339530" comment="glibc-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339531" comment="glibc-langpack-et is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339532" comment="glibc-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339533" comment="glibc-langpack-eu is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339534" comment="glibc-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339535" comment="glibc-langpack-fa is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339536" comment="glibc-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339537" comment="glibc-langpack-ff is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339538" comment="glibc-langpack-ff is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339539" comment="glibc-langpack-fi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339540" comment="glibc-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339541" comment="glibc-langpack-fil is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339542" comment="glibc-langpack-fil is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339543" comment="glibc-langpack-fo is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339544" comment="glibc-langpack-fo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339545" comment="glibc-langpack-fr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339546" comment="glibc-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339547" comment="glibc-langpack-fur is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339548" comment="glibc-langpack-fur is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339549" comment="glibc-langpack-fy is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339550" comment="glibc-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339551" comment="glibc-langpack-ga is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339552" comment="glibc-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339553" comment="glibc-langpack-gd is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339554" comment="glibc-langpack-gd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339555" comment="glibc-langpack-gez is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339556" comment="glibc-langpack-gez is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339557" comment="glibc-langpack-gl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339558" comment="glibc-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339559" comment="glibc-langpack-gu is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339560" comment="glibc-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339561" comment="glibc-langpack-gv is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339562" comment="glibc-langpack-gv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339563" comment="glibc-langpack-ha is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339564" comment="glibc-langpack-ha is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339565" comment="glibc-langpack-hak is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339566" comment="glibc-langpack-hak is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339567" comment="glibc-langpack-he is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339568" comment="glibc-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339569" comment="glibc-langpack-hi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339570" comment="glibc-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339571" comment="glibc-langpack-hif is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339572" comment="glibc-langpack-hif is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339573" comment="glibc-langpack-hne is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339574" comment="glibc-langpack-hne is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339575" comment="glibc-langpack-hr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339576" comment="glibc-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339577" comment="glibc-langpack-hsb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339578" comment="glibc-langpack-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339579" comment="glibc-langpack-ht is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339580" comment="glibc-langpack-ht is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339581" comment="glibc-langpack-hu is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339582" comment="glibc-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339583" comment="glibc-langpack-hy is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339584" comment="glibc-langpack-hy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339585" comment="glibc-langpack-ia is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339586" comment="glibc-langpack-ia is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339587" comment="glibc-langpack-id is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339588" comment="glibc-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339589" comment="glibc-langpack-ig is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339590" comment="glibc-langpack-ig is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339591" comment="glibc-langpack-ik is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339592" comment="glibc-langpack-ik is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339593" comment="glibc-langpack-is is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339594" comment="glibc-langpack-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339595" comment="glibc-langpack-it is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339596" comment="glibc-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339597" comment="glibc-langpack-iu is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339598" comment="glibc-langpack-iu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339599" comment="glibc-langpack-ja is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339600" comment="glibc-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339601" comment="glibc-langpack-ka is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339602" comment="glibc-langpack-ka is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339603" comment="glibc-langpack-kab is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339604" comment="glibc-langpack-kab is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339605" comment="glibc-langpack-kk is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339606" comment="glibc-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339607" comment="glibc-langpack-kl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339608" comment="glibc-langpack-kl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339609" comment="glibc-langpack-km is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339610" comment="glibc-langpack-km is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339611" comment="glibc-langpack-kn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339612" comment="glibc-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339613" comment="glibc-langpack-ko is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339614" comment="glibc-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339615" comment="glibc-langpack-kok is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339616" comment="glibc-langpack-kok is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339617" comment="glibc-langpack-ks is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339618" comment="glibc-langpack-ks is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339619" comment="glibc-langpack-ku is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339620" comment="glibc-langpack-ku is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339621" comment="glibc-langpack-kw is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339622" comment="glibc-langpack-kw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339623" comment="glibc-langpack-ky is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339624" comment="glibc-langpack-ky is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339625" comment="glibc-langpack-lb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339626" comment="glibc-langpack-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339627" comment="glibc-langpack-lg is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339628" comment="glibc-langpack-lg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339629" comment="glibc-langpack-li is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339630" comment="glibc-langpack-li is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339631" comment="glibc-langpack-lij is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339632" comment="glibc-langpack-lij is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339633" comment="glibc-langpack-ln is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339634" comment="glibc-langpack-ln is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339635" comment="glibc-langpack-lo is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339636" comment="glibc-langpack-lo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339637" comment="glibc-langpack-lt is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339638" comment="glibc-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339639" comment="glibc-langpack-lv is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339640" comment="glibc-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339641" comment="glibc-langpack-lzh is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339642" comment="glibc-langpack-lzh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339643" comment="glibc-langpack-mag is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339644" comment="glibc-langpack-mag is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339645" comment="glibc-langpack-mai is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339646" comment="glibc-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339647" comment="glibc-langpack-mfe is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339648" comment="glibc-langpack-mfe is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339649" comment="glibc-langpack-mg is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339650" comment="glibc-langpack-mg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339651" comment="glibc-langpack-mhr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339652" comment="glibc-langpack-mhr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339653" comment="glibc-langpack-mi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339654" comment="glibc-langpack-mi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339655" comment="glibc-langpack-miq is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339656" comment="glibc-langpack-miq is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339657" comment="glibc-langpack-mjw is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339658" comment="glibc-langpack-mjw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339659" comment="glibc-langpack-mk is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339660" comment="glibc-langpack-mk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339661" comment="glibc-langpack-ml is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339662" comment="glibc-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339663" comment="glibc-langpack-mn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339664" comment="glibc-langpack-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339665" comment="glibc-langpack-mni is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339666" comment="glibc-langpack-mni is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339667" comment="glibc-langpack-mnw is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339668" comment="glibc-langpack-mnw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339669" comment="glibc-langpack-mr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339670" comment="glibc-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339671" comment="glibc-langpack-ms is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339672" comment="glibc-langpack-ms is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339673" comment="glibc-langpack-mt is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339674" comment="glibc-langpack-mt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339675" comment="glibc-langpack-my is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339676" comment="glibc-langpack-my is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339677" comment="glibc-langpack-nan is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339678" comment="glibc-langpack-nan is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339679" comment="glibc-langpack-nb is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339680" comment="glibc-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339681" comment="glibc-langpack-nds is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339682" comment="glibc-langpack-nds is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339683" comment="glibc-langpack-ne is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339684" comment="glibc-langpack-ne is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339685" comment="glibc-langpack-nhn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339686" comment="glibc-langpack-nhn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339687" comment="glibc-langpack-niu is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339688" comment="glibc-langpack-niu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339689" comment="glibc-langpack-nl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339690" comment="glibc-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339691" comment="glibc-langpack-nn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339692" comment="glibc-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339693" comment="glibc-langpack-nr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339694" comment="glibc-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339695" comment="glibc-langpack-nso is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339696" comment="glibc-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339697" comment="glibc-langpack-oc is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339698" comment="glibc-langpack-oc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339699" comment="glibc-langpack-om is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339700" comment="glibc-langpack-om is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339701" comment="glibc-langpack-or is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339702" comment="glibc-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339703" comment="glibc-langpack-os is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339704" comment="glibc-langpack-os is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339705" comment="glibc-langpack-pa is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339706" comment="glibc-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339707" comment="glibc-langpack-pap is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339708" comment="glibc-langpack-pap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339709" comment="glibc-langpack-pl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339710" comment="glibc-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339711" comment="glibc-langpack-ps is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339712" comment="glibc-langpack-ps is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339713" comment="glibc-langpack-pt is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339714" comment="glibc-langpack-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339715" comment="glibc-langpack-quz is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339716" comment="glibc-langpack-quz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339717" comment="glibc-langpack-raj is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339718" comment="glibc-langpack-raj is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339719" comment="glibc-langpack-ro is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339720" comment="glibc-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339721" comment="glibc-langpack-ru is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339722" comment="glibc-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339723" comment="glibc-langpack-rw is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339724" comment="glibc-langpack-rw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339725" comment="glibc-langpack-sa is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339726" comment="glibc-langpack-sa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339727" comment="glibc-langpack-sah is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339728" comment="glibc-langpack-sah is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339729" comment="glibc-langpack-sat is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339730" comment="glibc-langpack-sat is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339731" comment="glibc-langpack-sc is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339732" comment="glibc-langpack-sc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339733" comment="glibc-langpack-sd is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339734" comment="glibc-langpack-sd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339735" comment="glibc-langpack-se is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339736" comment="glibc-langpack-se is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339737" comment="glibc-langpack-sgs is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339738" comment="glibc-langpack-sgs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339739" comment="glibc-langpack-shn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339740" comment="glibc-langpack-shn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339741" comment="glibc-langpack-shs is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339742" comment="glibc-langpack-shs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339743" comment="glibc-langpack-si is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339744" comment="glibc-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339745" comment="glibc-langpack-sid is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339746" comment="glibc-langpack-sid is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339747" comment="glibc-langpack-sk is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339748" comment="glibc-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339749" comment="glibc-langpack-sl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339750" comment="glibc-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339751" comment="glibc-langpack-sm is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339752" comment="glibc-langpack-sm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339753" comment="glibc-langpack-so is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339754" comment="glibc-langpack-so is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339755" comment="glibc-langpack-sq is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339756" comment="glibc-langpack-sq is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339757" comment="glibc-langpack-sr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339758" comment="glibc-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339759" comment="glibc-langpack-ss is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339760" comment="glibc-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339761" comment="glibc-langpack-st is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339762" comment="glibc-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339763" comment="glibc-langpack-sv is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339764" comment="glibc-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339765" comment="glibc-langpack-sw is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339766" comment="glibc-langpack-sw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339767" comment="glibc-langpack-szl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339768" comment="glibc-langpack-szl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339769" comment="glibc-langpack-ta is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339770" comment="glibc-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339771" comment="glibc-langpack-tcy is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339772" comment="glibc-langpack-tcy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339773" comment="glibc-langpack-te is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339774" comment="glibc-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339775" comment="glibc-langpack-tg is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339776" comment="glibc-langpack-tg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339777" comment="glibc-langpack-th is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339778" comment="glibc-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339779" comment="glibc-langpack-the is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339780" comment="glibc-langpack-the is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339781" comment="glibc-langpack-ti is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339782" comment="glibc-langpack-ti is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339783" comment="glibc-langpack-tig is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339784" comment="glibc-langpack-tig is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339785" comment="glibc-langpack-tk is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339786" comment="glibc-langpack-tk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339787" comment="glibc-langpack-tl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339788" comment="glibc-langpack-tl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339789" comment="glibc-langpack-tn is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339790" comment="glibc-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339791" comment="glibc-langpack-to is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339792" comment="glibc-langpack-to is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339793" comment="glibc-langpack-tpi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339794" comment="glibc-langpack-tpi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339795" comment="glibc-langpack-tr is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339796" comment="glibc-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339797" comment="glibc-langpack-ts is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339798" comment="glibc-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339799" comment="glibc-langpack-tt is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339800" comment="glibc-langpack-tt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339801" comment="glibc-langpack-ug is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339802" comment="glibc-langpack-ug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339803" comment="glibc-langpack-uk is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339804" comment="glibc-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339805" comment="glibc-langpack-unm is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339806" comment="glibc-langpack-unm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339807" comment="glibc-langpack-ur is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339808" comment="glibc-langpack-ur is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339809" comment="glibc-langpack-uz is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339810" comment="glibc-langpack-uz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339811" comment="glibc-langpack-ve is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339812" comment="glibc-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339813" comment="glibc-langpack-vi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339814" comment="glibc-langpack-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339815" comment="glibc-langpack-wa is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339816" comment="glibc-langpack-wa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339817" comment="glibc-langpack-wae is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339818" comment="glibc-langpack-wae is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339819" comment="glibc-langpack-wal is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339820" comment="glibc-langpack-wal is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339821" comment="glibc-langpack-wo is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339822" comment="glibc-langpack-wo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339823" comment="glibc-langpack-xh is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339824" comment="glibc-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339825" comment="glibc-langpack-yi is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339826" comment="glibc-langpack-yi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339827" comment="glibc-langpack-yo is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339828" comment="glibc-langpack-yo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339829" comment="glibc-langpack-yue is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339830" comment="glibc-langpack-yue is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339831" comment="glibc-langpack-yuw is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339832" comment="glibc-langpack-yuw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339833" comment="glibc-langpack-zh is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339834" comment="glibc-langpack-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339835" comment="glibc-langpack-zu is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339836" comment="glibc-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339837" comment="glibc-locale-source is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339838" comment="glibc-locale-source is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339839" comment="glibc-minimal-langpack is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339840" comment="glibc-minimal-langpack is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339417" comment="glibc-nss-devel is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339841" comment="glibc-nss-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339419" comment="glibc-static is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339842" comment="glibc-static is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339843" comment="glibc-utils is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339844" comment="glibc-utils is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339423" comment="libnsl is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339845" comment="libnsl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339846" comment="nscd is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339847" comment="nscd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339427" comment="nss_db is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339848" comment="nss_db is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339429" comment="nss_hesiod is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339849" comment="nss_hesiod is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339011" comment="glibc-doc is earlier than 0:2.34-100.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243339850" comment="glibc-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243501" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:3501: nghttp2 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:3501" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3501"/>
        <reference ref_id="CVE-2024-28182" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28182"/>
        <reference ref_id="ALSA-2024:3501" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3501.html"/>
        <description>libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.

Security Fix(es):

* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-05-30"/>
          <updated date="2024-05-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268639" id="2268639"></bugzilla>
          <cve public="20240403" href="https://access.redhat.com/security/cve/CVE-2024-28182" impact="Moderate" cwe="CWE-390" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28182</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243501001" comment="libnghttp2 is earlier than 0:1.43.0-5.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838002" comment="libnghttp2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243501003" comment="libnghttp2-devel is earlier than 0:1.43.0-5.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838004" comment="libnghttp2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243501006" comment="nghttp2 is earlier than 0:1.43.0-5.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20235838006" comment="nghttp2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243661" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:3661: booth security update (Important)</title>
        <reference ref_id="RHSA-2024:3661" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3661"/>
        <reference ref_id="CVE-2024-3049" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3049"/>
        <reference ref_id="ALSA-2024:3661" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3661.html"/>
        <description>The Booth cluster ticket manager is a component to bridge high availability clusters spanning multiple sites, in particular, to provide decision inputs to local Pacemaker cluster resource managers. It operates as a distributed consensus-based service, presumably on a separate physical network. Tickets facilitated by a Booth formation are the units of authorization that can be bound to certain resources. This will ensure that the resources are run at only one (granted) site at a time.

Security Fix(es):

* booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server (CVE-2024-3049)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-06"/>
          <updated date="2024-06-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2272082" id="2272082"></bugzilla>
          <cve public="20240527" href="https://access.redhat.com/security/cve/CVE-2024-3049" impact="Important" cwe="CWE-345" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-3049</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243661001" comment="booth is earlier than 0:1.1-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580002" comment="booth is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243661005" comment="booth-core is earlier than 0:1.1-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580006" comment="booth-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243661003" comment="booth-arbitrator is earlier than 0:1.1-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580004" comment="booth-arbitrator is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243661007" comment="booth-site is earlier than 0:1.1-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580008" comment="booth-site is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243661009" comment="booth-test is earlier than 0:1.1-1.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20226580010" comment="booth-test is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243668" version="634" class="patch">
      <metadata>
        <title>ALSA-2024:3668: ruby:3.1 security, bug fix, and enhancement update (Moderate)</title>
        <reference ref_id="RHSA-2024:3668" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3668"/>
        <reference ref_id="CVE-2024-27280" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27280"/>
        <reference ref_id="CVE-2024-27281" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27281"/>
        <reference ref_id="CVE-2024-27282" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27282"/>
        <reference ref_id="ALSA-2024:3668" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3668.html"/>
        <description>Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

The following packages have been upgraded to a later upstream version: ruby (3.1). (AlmaLinux-35449)

Security Fix(es):

* ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280)
* ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281)
* ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-06"/>
          <updated date="2024-06-06"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2270749" id="2270749"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270750" id="2270750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2276810" id="2276810"></bugzilla>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-27280" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2024-27280</cve>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-27281" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2024-27281</cve>
          <cve public="20240423" href="https://access.redhat.com/security/cve/CVE-2024-27282" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L">CVE-2024-27282</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20241576055" comment="Module ruby:3.1 is enabled"/>
              <criteria operator="OR">
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668054" comment="ruby is earlier than 0:3.1.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838044" comment="ruby is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668055" comment="ruby-bundled-gems is earlier than 0:3.1.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576004" comment="ruby-bundled-gems is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668056" comment="ruby-devel is earlier than 0:3.1.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838045" comment="ruby-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668057" comment="ruby-libs is earlier than 0:3.1.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838046" comment="ruby-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668058" comment="rubygem-bigdecimal is earlier than 0:3.1.1-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838047" comment="rubygem-bigdecimal is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668059" comment="rubygem-io-console is earlier than 0:0.5.11-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838048" comment="rubygem-io-console is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668060" comment="rubygem-json is earlier than 0:2.6.1-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838049" comment="rubygem-json is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576063" comment="rubygem-mysql2 is earlier than 0:0.5.4-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576026" comment="rubygem-mysql2 is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576064" comment="rubygem-pg is earlier than 0:1.3.5-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576030" comment="rubygem-pg is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668061" comment="rubygem-psych is earlier than 0:4.0.4-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838050" comment="rubygem-psych is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668062" comment="rubygem-rbs is earlier than 0:2.7.0-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838058" comment="rubygem-rbs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668063" comment="ruby-default-gems is earlier than 0:3.1.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838051" comment="ruby-default-gems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668064" comment="ruby-doc is earlier than 0:3.1.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838052" comment="ruby-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668065" comment="rubygem-bundler is earlier than 0:2.3.27-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838053" comment="rubygem-bundler is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668066" comment="rubygem-irb is earlier than 0:1.4.1-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838054" comment="rubygem-irb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668067" comment="rubygem-minitest is earlier than 0:5.15.0-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838055" comment="rubygem-minitest is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576072" comment="rubygem-mysql2-doc is earlier than 0:0.5.4-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576028" comment="rubygem-mysql2-doc is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576073" comment="rubygem-pg-doc is earlier than 0:1.3.5-1.module_el9.1.0+8+503f6fbd"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20241576032" comment="rubygem-pg-doc is signed with AlmaLinux OS 9 key"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668068" comment="rubygem-power_assert is earlier than 0:2.0.1-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838056" comment="rubygem-power_assert is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668069" comment="rubygem-rake is earlier than 0:13.0.6-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838057" comment="rubygem-rake is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668070" comment="rubygem-rdoc is earlier than 0:6.4.1.1-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838059" comment="rubygem-rdoc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668071" comment="rubygem-rexml is earlier than 0:3.2.5-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838060" comment="rubygem-rexml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668072" comment="rubygem-rss is earlier than 0:0.2.9-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838061" comment="rubygem-rss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668073" comment="rubygem-test-unit is earlier than 0:3.5.3-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838062" comment="rubygem-test-unit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668074" comment="rubygem-typeprof is earlier than 0:0.21.3-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838063" comment="rubygem-typeprof is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668075" comment="rubygems is earlier than 0:3.3.27-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838064" comment="rubygems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
                <criteria operator="AND">
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243668076" comment="rubygems-devel is earlier than 0:3.3.27-144.module_el9.4.0+101+d58a8d95"/>
                  <criterion test_ref="oval:org.almalinux.alsa:tst:20243838065" comment="rubygems-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
                </criteria>
              </criteria>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243754" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:3754: ipa security update (Important)</title>
        <reference ref_id="RHSA-2024:3754" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3754"/>
        <reference ref_id="CVE-2024-2698" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2698"/>
        <reference ref_id="CVE-2024-3183" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3183"/>
        <reference ref_id="ALSA-2024:3754" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3754.html"/>
        <description>AlmaLinux Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

Security Fix(es):

* freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698)
* freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-10"/>
          <updated date="2024-06-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2270353" id="2270353"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270685" id="2270685"></bugzilla>
          <cve public="20240610" href="https://access.redhat.com/security/cve/CVE-2024-2698" impact="Important" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N">CVE-2024-2698</cve>
          <cve public="20240610" href="https://access.redhat.com/security/cve/CVE-2024-3183" impact="Important" cwe="CWE-916" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N">CVE-2024-3183</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754028" comment="ipa-client is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141002" comment="ipa-client is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754029" comment="ipa-client-epn is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141006" comment="ipa-client-epn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754030" comment="ipa-client-samba is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141008" comment="ipa-client-samba is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754031" comment="ipa-server is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141014" comment="ipa-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754032" comment="ipa-server-trust-ad is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141020" comment="ipa-server-trust-ad is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754033" comment="ipa-client-common is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141004" comment="ipa-client-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754034" comment="ipa-common is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141010" comment="ipa-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754035" comment="ipa-selinux is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141012" comment="ipa-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754036" comment="ipa-server-common is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141016" comment="ipa-server-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754037" comment="ipa-server-dns is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141018" comment="ipa-server-dns is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754038" comment="python3-ipaclient is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141022" comment="python3-ipaclient is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754039" comment="python3-ipalib is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141024" comment="python3-ipalib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754040" comment="python3-ipaserver is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141026" comment="python3-ipaserver is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243754041" comment="python3-ipatests is earlier than 0:4.11.0-15.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240141028" comment="python3-ipatests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243820" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:3820: fence-agents security update (Moderate)</title>
        <reference ref_id="RHSA-2024:3820" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3820"/>
        <reference ref_id="CVE-2024-34064" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-34064"/>
        <reference ref_id="ALSA-2024:3820" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3820.html"/>
        <description>The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. 

Security Fix(es):

* jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2279476" id="2279476"></bugzilla>
          <cve public="20240506" href="https://access.redhat.com/security/cve/CVE-2024-34064" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-34064</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820110" comment="fence-agents-aliyun is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161002" comment="fence-agents-aliyun is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820003" comment="fence-agents-all is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161004" comment="fence-agents-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820111" comment="fence-agents-aws is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161012" comment="fence-agents-aws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820112" comment="fence-agents-azure-arm is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161014" comment="fence-agents-azure-arm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820113" comment="fence-agents-compute is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161026" comment="fence-agents-compute is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820114" comment="fence-agents-gce is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161036" comment="fence-agents-gce is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820063" comment="fence-agents-kdump is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161064" comment="fence-agents-kdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820065" comment="fence-agents-kubevirt is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161066" comment="fence-agents-kubevirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820115" comment="fence-agents-openstack is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161072" comment="fence-agents-openstack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820073" comment="fence-agents-redfish is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161074" comment="fence-agents-redfish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820116" comment="fence-agents-zvm is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161094" comment="fence-agents-zvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820117" comment="fence-virt is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161096" comment="fence-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820118" comment="fence-virtd is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161098" comment="fence-virtd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820119" comment="fence-virtd-cpg is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161100" comment="fence-virtd-cpg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820120" comment="fence-virtd-libvirt is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161102" comment="fence-virtd-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820121" comment="fence-virtd-multicast is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161104" comment="fence-virtd-multicast is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820122" comment="fence-virtd-serial is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161106" comment="fence-virtd-serial is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820123" comment="fence-virtd-tcp is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161108" comment="fence-virtd-tcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820124" comment="ha-cloud-support is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161110" comment="ha-cloud-support is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820005" comment="fence-agents-amt-ws is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161006" comment="fence-agents-amt-ws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820007" comment="fence-agents-apc is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161008" comment="fence-agents-apc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820009" comment="fence-agents-apc-snmp is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161010" comment="fence-agents-apc-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820015" comment="fence-agents-bladecenter is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161016" comment="fence-agents-bladecenter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820017" comment="fence-agents-brocade is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161018" comment="fence-agents-brocade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820019" comment="fence-agents-cisco-mds is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161020" comment="fence-agents-cisco-mds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820021" comment="fence-agents-cisco-ucs is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161022" comment="fence-agents-cisco-ucs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820023" comment="fence-agents-common is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161024" comment="fence-agents-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820027" comment="fence-agents-drac5 is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161028" comment="fence-agents-drac5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820029" comment="fence-agents-eaton-snmp is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161030" comment="fence-agents-eaton-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820031" comment="fence-agents-emerson is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161032" comment="fence-agents-emerson is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820033" comment="fence-agents-eps is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161034" comment="fence-agents-eps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820037" comment="fence-agents-heuristics-ping is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161038" comment="fence-agents-heuristics-ping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820039" comment="fence-agents-hpblade is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161040" comment="fence-agents-hpblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820041" comment="fence-agents-ibm-powervs is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161042" comment="fence-agents-ibm-powervs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820043" comment="fence-agents-ibm-vpc is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161044" comment="fence-agents-ibm-vpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820045" comment="fence-agents-ibmblade is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161046" comment="fence-agents-ibmblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820047" comment="fence-agents-ifmib is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161048" comment="fence-agents-ifmib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820049" comment="fence-agents-ilo-moonshot is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161050" comment="fence-agents-ilo-moonshot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820051" comment="fence-agents-ilo-mp is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161052" comment="fence-agents-ilo-mp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820053" comment="fence-agents-ilo-ssh is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161054" comment="fence-agents-ilo-ssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820055" comment="fence-agents-ilo2 is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161056" comment="fence-agents-ilo2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820057" comment="fence-agents-intelmodular is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161058" comment="fence-agents-intelmodular is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820059" comment="fence-agents-ipdu is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161060" comment="fence-agents-ipdu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820061" comment="fence-agents-ipmilan is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161062" comment="fence-agents-ipmilan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820067" comment="fence-agents-lpar is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161068" comment="fence-agents-lpar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820069" comment="fence-agents-mpath is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161070" comment="fence-agents-mpath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820075" comment="fence-agents-rhevm is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161076" comment="fence-agents-rhevm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820077" comment="fence-agents-rsa is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161078" comment="fence-agents-rsa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820079" comment="fence-agents-rsb is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161080" comment="fence-agents-rsb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820081" comment="fence-agents-sbd is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161082" comment="fence-agents-sbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820083" comment="fence-agents-scsi is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161084" comment="fence-agents-scsi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820085" comment="fence-agents-virsh is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161086" comment="fence-agents-virsh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820087" comment="fence-agents-vmware-rest is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161088" comment="fence-agents-vmware-rest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820089" comment="fence-agents-vmware-soap is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161090" comment="fence-agents-vmware-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243820091" comment="fence-agents-wti is earlier than 0:4.10.0-62.el9_4.3"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161092" comment="fence-agents-wti is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243826" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:3826: podman security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:3826" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3826"/>
        <reference ref_id="CVE-2023-45290" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45290"/>
        <reference ref_id="CVE-2024-28176" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28176"/>
        <reference ref_id="CVE-2024-28180" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28180"/>
        <reference ref_id="ALSA-2024:3826" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3826.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fixes:

* podman: jose-go: improper handling of highly compressed data (CVE-2024-28180)
* podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* podman: jose: resource exhaustion (CVE-2024-28176)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268017" id="2268017"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268820" id="2268820"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268854" id="2268854"></bugzilla>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2023-45290" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-45290</cve>
          <cve public="20240309" href="https://access.redhat.com/security/cve/CVE-2024-28176" impact="Moderate" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28176</cve>
          <cve public="20240309" href="https://access.redhat.com/security/cve/CVE-2024-28180" impact="Moderate" cwe="CWE-409" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28180</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243826010" comment="podman is earlier than 4:4.9.4-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243826011" comment="podman-plugins is earlier than 4:4.9.4-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243826012" comment="podman-remote is earlier than 4:4.9.4-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243826013" comment="podman-tests is earlier than 4:4.9.4-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243826014" comment="podman-docker is earlier than 4:4.9.4-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243830" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:3830: gvisor-tap-vsock security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:3830" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3830"/>
        <reference ref_id="CVE-2023-45290" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45290"/>
        <reference ref_id="ALSA-2024:3830" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3830.html"/>
        <description>A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.

Security Fix(es):

* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268017" id="2268017"></bugzilla>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2023-45290" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-45290</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20243830003" comment="gvisor-tap-vsock is earlier than 6:0.7.3-3.el9_4.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20243830004" comment="gvisor-tap-vsock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243834" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:3834: gdk-pixbuf2 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:3834" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3834"/>
        <reference ref_id="CVE-2022-48622" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-48622"/>
        <reference ref_id="ALSA-2024:3834" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3834.html"/>
        <description>The gdk-pixbuf2 packages provide an image loading library that can be extended
by loadable modules for new image formats. It is used by toolkits such as GTK+
or clutter.

Security Fix(es):

* gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2260545" id="2260545"></bugzilla>
          <cve public="20240126" href="https://access.redhat.com/security/cve/CVE-2022-48622" impact="Moderate" cwe="CWE-787" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2022-48622</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243834001" comment="gdk-pixbuf2 is earlier than 0:2.42.6-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216002" comment="gdk-pixbuf2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243834003" comment="gdk-pixbuf2-devel is earlier than 0:2.42.6-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216004" comment="gdk-pixbuf2-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243834005" comment="gdk-pixbuf2-modules is earlier than 0:2.42.6-4.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232216006" comment="gdk-pixbuf2-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243835" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:3835: libreoffice security update (Important)</title>
        <reference ref_id="RHSA-2024:3835" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3835"/>
        <reference ref_id="CVE-2023-6185" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6185"/>
        <reference ref_id="CVE-2023-6186" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6186"/>
        <reference ref_id="ALSA-2024:3835" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3835.html"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

Security Fix(es):

* libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185)
* libreoffice: Insufficient macro permission validation leading to macro execution (CVE-2023-6186)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2254003" id="2254003"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2254005" id="2254005"></bugzilla>
          <cve public="20231211" href="https://access.redhat.com/security/cve/CVE-2023-6185" impact="Important" cwe="CWE-250" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H">CVE-2023-6185</cve>
          <cve public="20231211" href="https://access.redhat.com/security/cve/CVE-2023-6186" impact="Important" cwe="CWE-250" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H">CVE-2023-6186</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835358" comment="libreoffice is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755359" comment="libreoffice is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835359" comment="libreoffice-base is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755361" comment="libreoffice-base is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835360" comment="libreoffice-calc is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755363" comment="libreoffice-calc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835361" comment="libreoffice-core is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755365" comment="libreoffice-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835362" comment="libreoffice-draw is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755367" comment="libreoffice-draw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835363" comment="libreoffice-emailmerge is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755369" comment="libreoffice-emailmerge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835364" comment="libreoffice-filters is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755371" comment="libreoffice-filters is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835365" comment="libreoffice-gdb-debug-support is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755373" comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835366" comment="libreoffice-graphicfilter is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755375" comment="libreoffice-graphicfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835367" comment="libreoffice-gtk3 is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755377" comment="libreoffice-gtk3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835368" comment="libreoffice-help-ar is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755379" comment="libreoffice-help-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835369" comment="libreoffice-help-bg is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755381" comment="libreoffice-help-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835370" comment="libreoffice-help-bn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755383" comment="libreoffice-help-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835371" comment="libreoffice-help-ca is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755385" comment="libreoffice-help-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835372" comment="libreoffice-help-cs is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755387" comment="libreoffice-help-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835373" comment="libreoffice-help-da is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755389" comment="libreoffice-help-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835374" comment="libreoffice-help-de is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755391" comment="libreoffice-help-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835375" comment="libreoffice-help-dz is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755393" comment="libreoffice-help-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835376" comment="libreoffice-help-el is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755395" comment="libreoffice-help-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835377" comment="libreoffice-help-en is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755397" comment="libreoffice-help-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835378" comment="libreoffice-help-eo is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755399" comment="libreoffice-help-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835379" comment="libreoffice-help-es is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755401" comment="libreoffice-help-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835380" comment="libreoffice-help-et is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755403" comment="libreoffice-help-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835381" comment="libreoffice-help-eu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755405" comment="libreoffice-help-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835382" comment="libreoffice-help-fi is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755407" comment="libreoffice-help-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835383" comment="libreoffice-help-fr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755409" comment="libreoffice-help-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835384" comment="libreoffice-help-gl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755411" comment="libreoffice-help-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835385" comment="libreoffice-help-gu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755413" comment="libreoffice-help-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835386" comment="libreoffice-help-he is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755415" comment="libreoffice-help-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835387" comment="libreoffice-help-hi is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755417" comment="libreoffice-help-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835388" comment="libreoffice-help-hr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755419" comment="libreoffice-help-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835389" comment="libreoffice-help-hu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755421" comment="libreoffice-help-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835390" comment="libreoffice-help-id is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755423" comment="libreoffice-help-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835391" comment="libreoffice-help-it is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755425" comment="libreoffice-help-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835392" comment="libreoffice-help-ja is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755427" comment="libreoffice-help-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835393" comment="libreoffice-help-ko is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755429" comment="libreoffice-help-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835394" comment="libreoffice-help-lt is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755431" comment="libreoffice-help-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835395" comment="libreoffice-help-lv is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755433" comment="libreoffice-help-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835396" comment="libreoffice-help-nb is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755435" comment="libreoffice-help-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835397" comment="libreoffice-help-nl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755437" comment="libreoffice-help-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835398" comment="libreoffice-help-nn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755439" comment="libreoffice-help-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835399" comment="libreoffice-help-pl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755441" comment="libreoffice-help-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835400" comment="libreoffice-help-pt-BR is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755443" comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835401" comment="libreoffice-help-pt-PT is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755445" comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835402" comment="libreoffice-help-ro is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755447" comment="libreoffice-help-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835403" comment="libreoffice-help-ru is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755449" comment="libreoffice-help-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835404" comment="libreoffice-help-si is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755451" comment="libreoffice-help-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835405" comment="libreoffice-help-sk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755453" comment="libreoffice-help-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835406" comment="libreoffice-help-sl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755455" comment="libreoffice-help-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835407" comment="libreoffice-help-sv is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755457" comment="libreoffice-help-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835408" comment="libreoffice-help-ta is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755459" comment="libreoffice-help-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835409" comment="libreoffice-help-tr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755461" comment="libreoffice-help-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835410" comment="libreoffice-help-uk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755463" comment="libreoffice-help-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835411" comment="libreoffice-help-zh-Hans is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755465" comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835412" comment="libreoffice-help-zh-Hant is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755467" comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835413" comment="libreoffice-impress is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755469" comment="libreoffice-impress is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835414" comment="libreoffice-langpack-af is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755471" comment="libreoffice-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835415" comment="libreoffice-langpack-ar is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755473" comment="libreoffice-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835416" comment="libreoffice-langpack-as is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755475" comment="libreoffice-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835417" comment="libreoffice-langpack-bg is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755477" comment="libreoffice-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835418" comment="libreoffice-langpack-bn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755479" comment="libreoffice-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835419" comment="libreoffice-langpack-br is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755481" comment="libreoffice-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835420" comment="libreoffice-langpack-ca is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755483" comment="libreoffice-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835421" comment="libreoffice-langpack-cs is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755485" comment="libreoffice-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835422" comment="libreoffice-langpack-cy is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755487" comment="libreoffice-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835423" comment="libreoffice-langpack-da is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755489" comment="libreoffice-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835424" comment="libreoffice-langpack-de is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755491" comment="libreoffice-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835425" comment="libreoffice-langpack-dz is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755493" comment="libreoffice-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835426" comment="libreoffice-langpack-el is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755495" comment="libreoffice-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835427" comment="libreoffice-langpack-en is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755497" comment="libreoffice-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835428" comment="libreoffice-langpack-eo is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755499" comment="libreoffice-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835429" comment="libreoffice-langpack-es is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755501" comment="libreoffice-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835430" comment="libreoffice-langpack-et is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755503" comment="libreoffice-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835431" comment="libreoffice-langpack-eu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755505" comment="libreoffice-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835432" comment="libreoffice-langpack-fa is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755507" comment="libreoffice-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835433" comment="libreoffice-langpack-fi is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755509" comment="libreoffice-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835434" comment="libreoffice-langpack-fr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755511" comment="libreoffice-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835435" comment="libreoffice-langpack-fy is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755513" comment="libreoffice-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835436" comment="libreoffice-langpack-ga is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755515" comment="libreoffice-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835437" comment="libreoffice-langpack-gl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755517" comment="libreoffice-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835438" comment="libreoffice-langpack-gu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755519" comment="libreoffice-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835439" comment="libreoffice-langpack-he is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755521" comment="libreoffice-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835440" comment="libreoffice-langpack-hi is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755523" comment="libreoffice-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835441" comment="libreoffice-langpack-hr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755525" comment="libreoffice-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835442" comment="libreoffice-langpack-hu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755527" comment="libreoffice-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835443" comment="libreoffice-langpack-id is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755529" comment="libreoffice-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835444" comment="libreoffice-langpack-it is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755531" comment="libreoffice-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835445" comment="libreoffice-langpack-ja is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755533" comment="libreoffice-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835446" comment="libreoffice-langpack-kk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755535" comment="libreoffice-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835447" comment="libreoffice-langpack-kn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755537" comment="libreoffice-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835448" comment="libreoffice-langpack-ko is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755539" comment="libreoffice-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835449" comment="libreoffice-langpack-lt is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755541" comment="libreoffice-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835450" comment="libreoffice-langpack-lv is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755543" comment="libreoffice-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835451" comment="libreoffice-langpack-mai is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755545" comment="libreoffice-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835452" comment="libreoffice-langpack-ml is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755547" comment="libreoffice-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835453" comment="libreoffice-langpack-mr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755549" comment="libreoffice-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835454" comment="libreoffice-langpack-nb is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755551" comment="libreoffice-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835455" comment="libreoffice-langpack-nl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755553" comment="libreoffice-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835456" comment="libreoffice-langpack-nn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755555" comment="libreoffice-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835457" comment="libreoffice-langpack-nr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755557" comment="libreoffice-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835458" comment="libreoffice-langpack-nso is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755559" comment="libreoffice-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835459" comment="libreoffice-langpack-or is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755561" comment="libreoffice-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835460" comment="libreoffice-langpack-pa is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755563" comment="libreoffice-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835461" comment="libreoffice-langpack-pl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755565" comment="libreoffice-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835462" comment="libreoffice-langpack-pt-BR is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755567" comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835463" comment="libreoffice-langpack-pt-PT is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755569" comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835464" comment="libreoffice-langpack-ro is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755571" comment="libreoffice-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835465" comment="libreoffice-langpack-ru is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755573" comment="libreoffice-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835466" comment="libreoffice-langpack-si is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755575" comment="libreoffice-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835467" comment="libreoffice-langpack-sk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755577" comment="libreoffice-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835468" comment="libreoffice-langpack-sl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755579" comment="libreoffice-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835469" comment="libreoffice-langpack-sr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755581" comment="libreoffice-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835470" comment="libreoffice-langpack-ss is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755583" comment="libreoffice-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835471" comment="libreoffice-langpack-st is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755585" comment="libreoffice-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835472" comment="libreoffice-langpack-sv is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755587" comment="libreoffice-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835473" comment="libreoffice-langpack-ta is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755589" comment="libreoffice-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835474" comment="libreoffice-langpack-te is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755591" comment="libreoffice-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835475" comment="libreoffice-langpack-th is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755593" comment="libreoffice-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835476" comment="libreoffice-langpack-tn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755595" comment="libreoffice-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835477" comment="libreoffice-langpack-tr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755597" comment="libreoffice-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835478" comment="libreoffice-langpack-ts is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755599" comment="libreoffice-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835479" comment="libreoffice-langpack-uk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755601" comment="libreoffice-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835480" comment="libreoffice-langpack-ve is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755603" comment="libreoffice-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835481" comment="libreoffice-langpack-xh is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755605" comment="libreoffice-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835482" comment="libreoffice-langpack-zh-Hans is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755607" comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835483" comment="libreoffice-langpack-zh-Hant is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755609" comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835484" comment="libreoffice-langpack-zu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755611" comment="libreoffice-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835485" comment="libreoffice-math is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755613" comment="libreoffice-math is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835486" comment="libreoffice-ogltrans is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755615" comment="libreoffice-ogltrans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835487" comment="libreoffice-pdfimport is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755617" comment="libreoffice-pdfimport is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835488" comment="libreoffice-pyuno is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755619" comment="libreoffice-pyuno is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835489" comment="libreoffice-sdk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755621" comment="libreoffice-sdk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835490" comment="libreoffice-sdk-doc is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755623" comment="libreoffice-sdk-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835491" comment="libreoffice-ure is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755625" comment="libreoffice-ure is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835492" comment="libreoffice-wiki-publisher is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755627" comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835493" comment="libreoffice-writer is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755629" comment="libreoffice-writer is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835494" comment="libreoffice-x11 is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755631" comment="libreoffice-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835495" comment="libreoffice-xsltfilter is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755633" comment="libreoffice-xsltfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835496" comment="libreofficekit is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755635" comment="libreofficekit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835497" comment="autocorr-af is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755637" comment="autocorr-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835498" comment="autocorr-bg is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755639" comment="autocorr-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835499" comment="autocorr-ca is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755641" comment="autocorr-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835500" comment="autocorr-cs is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755643" comment="autocorr-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835501" comment="autocorr-da is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755645" comment="autocorr-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835502" comment="autocorr-de is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755647" comment="autocorr-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835503" comment="autocorr-dsb is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755649" comment="autocorr-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835504" comment="autocorr-el is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755651" comment="autocorr-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835505" comment="autocorr-en is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755653" comment="autocorr-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835506" comment="autocorr-es is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755655" comment="autocorr-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835507" comment="autocorr-fa is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755657" comment="autocorr-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835508" comment="autocorr-fi is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755659" comment="autocorr-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835509" comment="autocorr-fr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755661" comment="autocorr-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835510" comment="autocorr-ga is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755663" comment="autocorr-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835511" comment="autocorr-hr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755665" comment="autocorr-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835512" comment="autocorr-hsb is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755667" comment="autocorr-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835513" comment="autocorr-hu is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755669" comment="autocorr-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835514" comment="autocorr-is is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755671" comment="autocorr-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835515" comment="autocorr-it is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755673" comment="autocorr-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835516" comment="autocorr-ja is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755675" comment="autocorr-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835517" comment="autocorr-ko is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755677" comment="autocorr-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835518" comment="autocorr-lb is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755679" comment="autocorr-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835519" comment="autocorr-lt is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755681" comment="autocorr-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835520" comment="autocorr-mn is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755683" comment="autocorr-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835521" comment="autocorr-nl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755685" comment="autocorr-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835522" comment="autocorr-pl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755687" comment="autocorr-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835523" comment="autocorr-pt is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755689" comment="autocorr-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835524" comment="autocorr-ro is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755691" comment="autocorr-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835525" comment="autocorr-ru is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755693" comment="autocorr-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835526" comment="autocorr-sk is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755695" comment="autocorr-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835527" comment="autocorr-sl is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755697" comment="autocorr-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835528" comment="autocorr-sr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755699" comment="autocorr-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835529" comment="autocorr-sv is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755701" comment="autocorr-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835530" comment="autocorr-tr is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755703" comment="autocorr-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835531" comment="autocorr-vi is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755705" comment="autocorr-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835532" comment="autocorr-vro is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755707" comment="autocorr-vro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835533" comment="autocorr-zh is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755709" comment="autocorr-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835534" comment="libreoffice-data is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755711" comment="libreoffice-data is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835535" comment="libreoffice-opensymbol-fonts is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755713" comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243835536" comment="libreoffice-ure-common is earlier than 1:7.1.8.1-12.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755715" comment="libreoffice-ure-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243837" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:3837: 389-ds-base security update (Important)</title>
        <reference ref_id="RHSA-2024:3837" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3837"/>
        <reference ref_id="CVE-2024-2199" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2199"/>
        <reference ref_id="CVE-2024-3657" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3657"/>
        <reference ref_id="ALSA-2024:3837" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3837.html"/>
        <description>389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.

Security Fix(es):

* 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657)
* 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2267976" id="2267976"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2274401" id="2274401"></bugzilla>
          <cve public="20240528" href="https://access.redhat.com/security/cve/CVE-2024-2199" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-2199</cve>
          <cve public="20240528" href="https://access.redhat.com/security/cve/CVE-2024-3657" impact="Important" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-3657</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243837001" comment="389-ds-base is earlier than 0:2.4.5-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162002" comment="389-ds-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243837003" comment="389-ds-base-devel is earlier than 0:2.4.5-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243837008" comment="389-ds-base-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243837005" comment="389-ds-base-libs is earlier than 0:2.4.5-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162004" comment="389-ds-base-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243837007" comment="python3-lib389 is earlier than 0:2.4.5-8.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20228162006" comment="python3-lib389 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243838" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:3838: ruby security update (Moderate)</title>
        <reference ref_id="RHSA-2024:3838" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3838"/>
        <reference ref_id="CVE-2021-33621" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2021-33621"/>
        <reference ref_id="CVE-2023-28755" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28755"/>
        <reference ref_id="CVE-2023-28756" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-28756"/>
        <reference ref_id="CVE-2024-27280" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27280"/>
        <reference ref_id="CVE-2024-27281" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27281"/>
        <reference ref_id="CVE-2024-27282" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-27282"/>
        <reference ref_id="ALSA-2024:3838" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3838.html"/>
        <description>Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

The following packages have been upgraded to a later upstream version: ruby
(3.0). (AlmaLinux-35740)

Security Fix(es):

* ruby/cgi-gem: HTTP response splitting in CGI (CVE-2021-33621)
* ruby: ReDoS vulnerability in URI (CVE-2023-28755)
* ruby: ReDoS vulnerability in Time (CVE-2023-28756)
* ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280)
* ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281)
* ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2149706" id="2149706"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184059" id="2184059"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2184061" id="2184061"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270749" id="2270749"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2270750" id="2270750"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2276810" id="2276810"></bugzilla>
          <cve public="20221118" href="https://access.redhat.com/security/cve/CVE-2021-33621" impact="Moderate" cwe="CWE-113" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2021-33621</cve>
          <cve public="20230321" href="https://access.redhat.com/security/cve/CVE-2023-28755" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-28755</cve>
          <cve public="20230321" href="https://access.redhat.com/security/cve/CVE-2023-28756" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2023-28756</cve>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-27280" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N">CVE-2024-27280</cve>
          <cve public="20240321" href="https://access.redhat.com/security/cve/CVE-2024-27281" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L">CVE-2024-27281</cve>
          <cve public="20240423" href="https://access.redhat.com/security/cve/CVE-2024-27282" impact="Moderate" cwe="CWE-125" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L">CVE-2024-27282</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838001" comment="ruby is earlier than 0:3.0.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838044" comment="ruby is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838005" comment="ruby-devel is earlier than 0:3.0.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838045" comment="ruby-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838009" comment="ruby-libs is earlier than 0:3.0.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838046" comment="ruby-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838011" comment="rubygem-bigdecimal is earlier than 0:3.0.0-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838047" comment="rubygem-bigdecimal is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838015" comment="rubygem-io-console is earlier than 0:0.5.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838048" comment="rubygem-io-console is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838019" comment="rubygem-json is earlier than 0:2.5.1-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838049" comment="rubygem-json is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838025" comment="rubygem-psych is earlier than 0:3.3.2-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838050" comment="rubygem-psych is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838003" comment="ruby-default-gems is earlier than 0:3.0.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838051" comment="ruby-default-gems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838007" comment="ruby-doc is earlier than 0:3.0.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838052" comment="ruby-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838013" comment="rubygem-bundler is earlier than 0:2.2.33-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838053" comment="rubygem-bundler is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838017" comment="rubygem-irb is earlier than 0:1.3.5-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838054" comment="rubygem-irb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838021" comment="rubygem-minitest is earlier than 0:5.14.2-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838055" comment="rubygem-minitest is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838023" comment="rubygem-power_assert is earlier than 0:1.2.1-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838056" comment="rubygem-power_assert is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838027" comment="rubygem-rake is earlier than 0:13.0.3-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838057" comment="rubygem-rake is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838029" comment="rubygem-rbs is earlier than 0:1.4.0-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838058" comment="rubygem-rbs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838031" comment="rubygem-rdoc is earlier than 0:6.3.4.1-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838059" comment="rubygem-rdoc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838033" comment="rubygem-rexml is earlier than 0:3.2.5-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838060" comment="rubygem-rexml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838035" comment="rubygem-rss is earlier than 0:0.2.9-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838061" comment="rubygem-rss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838037" comment="rubygem-test-unit is earlier than 0:3.3.7-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838062" comment="rubygem-test-unit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838039" comment="rubygem-typeprof is earlier than 0:0.15.2-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838063" comment="rubygem-typeprof is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838041" comment="rubygems is earlier than 0:3.2.33-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838064" comment="rubygems is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838043" comment="rubygems-devel is earlier than 0:3.2.33-162.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243838065" comment="rubygems-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243843" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:3843: cockpit security update (Moderate)</title>
        <reference ref_id="RHSA-2024:3843" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3843"/>
        <reference ref_id="CVE-2024-2947" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-2947"/>
        <reference ref_id="ALSA-2024:3843" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3843.html"/>
        <description>Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.

Security Fix(es):

* cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-11"/>
          <updated date="2024-06-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2271614" id="2271614"></bugzilla>
          <cve public="20240327" href="https://access.redhat.com/security/cve/CVE-2024-2947" impact="Moderate" cwe="CWE-77" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H">CVE-2024-2947</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843001" comment="cockpit is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843017" comment="cockpit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843003" comment="cockpit-bridge is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843018" comment="cockpit-bridge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843009" comment="cockpit-pcp is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843019" comment="cockpit-pcp is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843015" comment="cockpit-ws is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843020" comment="cockpit-ws is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843005" comment="cockpit-doc is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843021" comment="cockpit-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843007" comment="cockpit-packagekit is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843022" comment="cockpit-packagekit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843011" comment="cockpit-storaged is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843023" comment="cockpit-storaged is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843013" comment="cockpit-system is earlier than 0:311.2-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243843024" comment="cockpit-system is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243955" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:3955: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:3955" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3955"/>
        <reference ref_id="CVE-2024-5688" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5688"/>
        <reference ref_id="CVE-2024-5690" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5690"/>
        <reference ref_id="CVE-2024-5691" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5691"/>
        <reference ref_id="CVE-2024-5693" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5693"/>
        <reference ref_id="CVE-2024-5696" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5696"/>
        <reference ref_id="CVE-2024-5700" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5700"/>
        <reference ref_id="CVE-2024-5702" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-5702"/>
        <reference ref_id="ALSA-2024:3955" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3955.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

This update upgrades Firefox to version 115.12.0 ESR.

Security Fix(es):
  
* firefox: Use-after-free in networking (CVE-2024-5702)

* firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688)
* firefox: External protocol handlers leaked by timing attack (CVE-2024-5690)
* firefox:  Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)
* firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)
* firefox: Memory Corruption in Text Fragments (CVE-2024-5696)
* firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-17"/>
          <updated date="2024-06-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2291394" id="2291394"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2291395" id="2291395"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2291396" id="2291396"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2291397" id="2291397"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2291399" id="2291399"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2291400" id="2291400"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2291401" id="2291401"></bugzilla>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5688" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-5688</cve>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5690" impact="Moderate" cwe="CWE-385" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-5690</cve>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5691" impact="Moderate" cwe="CWE-284" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-5691</cve>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5693" impact="Moderate" cwe="CWE-829" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-5693</cve>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5696" impact="Moderate" cwe="CWE-1287" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-5696</cve>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5700" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-5700</cve>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2024-5702" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-5702</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243955004" comment="firefox is earlier than 0:115.12.0-1.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243955005" comment="firefox-x11 is earlier than 0:115.12.0-1.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20242549" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:2549: skopeo security and bug fix update (Moderate)</title>
        <reference ref_id="RHSA-2024:2549" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:2549"/>
        <reference ref_id="CVE-2024-24786" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24786"/>
        <reference ref_id="CVE-2024-28180" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-28180"/>
        <reference ref_id="ALSA-2024:2549" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-2549.html"/>
        <description>The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. 

Security Fix(es):

* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)

Bug Fix(es):

* TRIAGE CVE-2024-24786 skopeo: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [almalinux-9] - AlmaLinux 9.4 0day (JIRA:AlmaLinux-28235)
* skopeo: jose-go: improper handling of highly compressed data [almalinux-9] (JIRA:AlmaLinux-28736)</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-04-30"/>
          <updated date="2024-04-30"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2268046" id="2268046"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2268854" id="2268854"></bugzilla>
          <cve public="20240305" href="https://access.redhat.com/security/cve/CVE-2024-24786" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-24786</cve>
          <cve public="20240309" href="https://access.redhat.com/security/cve/CVE-2024-28180" impact="Moderate" cwe="CWE-409" cvss3="CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L">CVE-2024-28180</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242549001" comment="skopeo is earlier than 2:1.14.3-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227955002" comment="skopeo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20242549003" comment="skopeo-tests is earlier than 2:1.14.3-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227955004" comment="skopeo-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20243959" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:3959: flatpak security update (Important)</title>
        <reference ref_id="RHSA-2024:3959" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:3959"/>
        <reference ref_id="CVE-2024-32462" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-32462"/>
        <reference ref_id="ALSA-2024:3959" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-3959.html"/>
        <description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

Security Fix(es):

* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-17"/>
          <updated date="2024-06-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2275981" id="2275981"></bugzilla>
          <cve public="20240418" href="https://access.redhat.com/security/cve/CVE-2024-32462" impact="Important" cwe="CWE-88" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N">CVE-2024-32462</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243959001" comment="flatpak is earlier than 0:1.12.9-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518002" comment="flatpak is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243959003" comment="flatpak-devel is earlier than 0:1.12.9-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518004" comment="flatpak-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243959005" comment="flatpak-libs is earlier than 0:1.12.9-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518006" comment="flatpak-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243959009" comment="flatpak-session-helper is earlier than 0:1.12.9-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518010" comment="flatpak-session-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20243959007" comment="flatpak-selinux is earlier than 0:1.12.9-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236518008" comment="flatpak-selinux is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244078" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4078: python3.9 security update (Important)</title>
        <reference ref_id="RHSA-2024:4078" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4078"/>
        <reference ref_id="CVE-2023-6597" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-6597"/>
        <reference ref_id="CVE-2024-0450" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-0450"/>
        <reference ref_id="ALSA-2024:4078" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4078.html"/>
        <description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-25"/>
          <updated date="2024-06-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2276518" id="2276518"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2276525" id="2276525"></bugzilla>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2023-6597" impact="Important" cwe="CWE-61" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N">CVE-2023-6597</cve>
          <cve public="20240319" href="https://access.redhat.com/security/cve/CVE-2024-0450" impact="Moderate" cwe="CWE-450" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-0450</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078003" comment="python3 is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779016" comment="python3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078005" comment="python3-debug is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779017" comment="python3-debug is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078007" comment="python3-devel is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779018" comment="python3-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078009" comment="python3-idle is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779019" comment="python3-idle is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078011" comment="python3-libs is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779020" comment="python3-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078013" comment="python3-test is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779021" comment="python3-test is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078015" comment="python3-tkinter is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779022" comment="python3-tkinter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244078001" comment="python-unversioned-command is earlier than 0:3.9.18-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244779023" comment="python-unversioned-command is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244083" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4083: git security update (Important)</title>
        <reference ref_id="RHSA-2024:4083" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4083"/>
        <reference ref_id="CVE-2024-32002" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-32002"/>
        <reference ref_id="CVE-2024-32004" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-32004"/>
        <reference ref_id="CVE-2024-32020" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-32020"/>
        <reference ref_id="CVE-2024-32021" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-32021"/>
        <reference ref_id="CVE-2024-32465" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-32465"/>
        <reference ref_id="ALSA-2024:4083" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4083.html"/>
        <description>Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.

Security Fix(es):

* git: Recursive clones RCE (CVE-2024-32002)
* git: RCE while cloning local repos (CVE-2024-32004)
* git: additional local RCE (CVE-2024-32465)
* git: insecure hardlinks (CVE-2024-32020)
* git: symlink bypass (CVE-2024-32021)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-25"/>
          <updated date="2024-06-25"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2280421" id="2280421"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280428" id="2280428"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280446" id="2280446"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280466" id="2280466"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2280484" id="2280484"></bugzilla>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-32002" impact="Important" cwe="CWE-22-&gt;CWE-434" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H">CVE-2024-32002</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-32004" impact="Important" cwe="CWE-114" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H">CVE-2024-32004</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-32020" impact="Low" cwe="CWE-62" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L">CVE-2024-32020</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-32021" impact="Low" cwe="CWE-61" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L">CVE-2024-32021</cve>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-32465" impact="Moderate" cwe="CWE-22" cvss3="CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H">CVE-2024-32465</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083001" comment="git is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611002" comment="git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083005" comment="git-core is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611006" comment="git-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083009" comment="git-credential-libsecret is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611010" comment="git-credential-libsecret is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083011" comment="git-daemon is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611012" comment="git-daemon is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083019" comment="git-subtree is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611020" comment="git-subtree is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083003" comment="git-all is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611004" comment="git-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083007" comment="git-core-doc is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611008" comment="git-core-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083013" comment="git-email is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611014" comment="git-email is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083015" comment="git-gui is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611016" comment="git-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083017" comment="git-instaweb is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611018" comment="git-instaweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083021" comment="git-svn is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611022" comment="git-svn is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083023" comment="gitk is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611024" comment="gitk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083025" comment="gitweb is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611026" comment="gitweb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083027" comment="perl-Git is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611028" comment="perl-Git is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244083029" comment="perl-Git-SVN is earlier than 0:2.43.5-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230611030" comment="perl-Git-SVN is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244165" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4165: pki-core security update (Important)</title>
        <reference ref_id="RHSA-2024:4165" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4165"/>
        <reference ref_id="CVE-2023-4727" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-4727"/>
        <reference ref_id="ALSA-2024:4165" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4165.html"/>
        <description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by AlmaLinux Certificate System.

Security Fix(es):

* dogtag ca: token authentication bypass vulnerability (CVE-2023-4727)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-06-27"/>
          <updated date="2024-06-27"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2232218" id="2232218"></bugzilla>
          <cve public="20240611" href="https://access.redhat.com/security/cve/CVE-2023-4727" impact="Important" cwe="CWE-305" cvss3="CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2023-4727</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165018" comment="idm-pki-tools is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293016" comment="idm-pki-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165019" comment="idm-pki-acme is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293002" comment="idm-pki-acme is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165020" comment="idm-pki-base is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293004" comment="idm-pki-base is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165021" comment="idm-pki-ca is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293006" comment="idm-pki-ca is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165022" comment="idm-pki-est is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293008" comment="idm-pki-est is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165023" comment="idm-pki-java is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293010" comment="idm-pki-java is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165024" comment="idm-pki-kra is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293012" comment="idm-pki-kra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165025" comment="idm-pki-server is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293014" comment="idm-pki-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244165026" comment="python3-idm-pki is earlier than 0:11.5.0-2.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232293018" comment="python3-idm-pki is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244212" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:4212: golang security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4212" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4212"/>
        <reference ref_id="CVE-2024-24789" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24789"/>
        <reference ref_id="CVE-2024-24790" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24790"/>
        <reference ref_id="ALSA-2024:4212" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4212.html"/>
        <description>The golang packages provide the Go programming language compiler.

Security Fix(es):

* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
* golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-02"/>
          <updated date="2024-07-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2292668" id="2292668"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2292787" id="2292787"></bugzilla>
          <cve public="20240604" href="https://access.redhat.com/security/cve/CVE-2024-24789" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N">CVE-2024-24789</cve>
          <cve public="20240604" href="https://access.redhat.com/security/cve/CVE-2024-24790" impact="Moderate" cwe="CWE-115" cvss3="CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-24790</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212001" comment="go-toolset is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913014" comment="go-toolset is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212003" comment="golang is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913015" comment="golang is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212005" comment="golang-bin is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913016" comment="golang-bin is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212007" comment="golang-docs is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913017" comment="golang-docs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212009" comment="golang-misc is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913018" comment="golang-misc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212011" comment="golang-src is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913019" comment="golang-src is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244212013" comment="golang-tests is earlier than 0:1.21.11-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20246913020" comment="golang-tests is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244278" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4278: qemu-kvm security update (Important)</title>
        <reference ref_id="RHSA-2024:4278" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4278"/>
        <reference ref_id="CVE-2024-4467" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4467"/>
        <reference ref_id="ALSA-2024:4278" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4278.html"/>
        <description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

* qemu-kvm: QEMU: 'qemu-img info' leads to host file read/write (CVE-2024-4467)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-02"/>
          <updated date="2024-07-02"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2278875" id="2278875"></bugzilla>
          <cve public="20240702" href="https://access.redhat.com/security/cve/CVE-2024-4467" impact="Important" cwe="CWE-20-&gt;(CWE-200|CWE-400)" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-4467</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278001" comment="qemu-guest-agent is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263002" comment="qemu-guest-agent is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278003" comment="qemu-img is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263004" comment="qemu-img is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278040" comment="qemu-kvm is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263006" comment="qemu-kvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278041" comment="qemu-kvm-audio-pa is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263008" comment="qemu-kvm-audio-pa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278042" comment="qemu-kvm-block-blkio is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236368010" comment="qemu-kvm-block-blkio is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278043" comment="qemu-kvm-block-curl is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263010" comment="qemu-kvm-block-curl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278044" comment="qemu-kvm-block-rbd is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263012" comment="qemu-kvm-block-rbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278045" comment="qemu-kvm-common is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263014" comment="qemu-kvm-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278046" comment="qemu-kvm-core is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263016" comment="qemu-kvm-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278047" comment="qemu-kvm-device-display-virtio-gpu is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263018" comment="qemu-kvm-device-display-virtio-gpu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278048" comment="qemu-kvm-device-display-virtio-gpu-ccw is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263020" comment="qemu-kvm-device-display-virtio-gpu-ccw is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278049" comment="qemu-kvm-device-display-virtio-gpu-pci is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263024" comment="qemu-kvm-device-display-virtio-gpu-pci is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278050" comment="qemu-kvm-device-display-virtio-vga is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263028" comment="qemu-kvm-device-display-virtio-vga is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278051" comment="qemu-kvm-device-usb-host is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263032" comment="qemu-kvm-device-usb-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278052" comment="qemu-kvm-device-usb-redirect is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263034" comment="qemu-kvm-device-usb-redirect is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278053" comment="qemu-kvm-docs is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263036" comment="qemu-kvm-docs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278054" comment="qemu-kvm-tools is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263038" comment="qemu-kvm-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278055" comment="qemu-kvm-ui-egl-headless is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263040" comment="qemu-kvm-ui-egl-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278056" comment="qemu-kvm-ui-opengl is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263042" comment="qemu-kvm-ui-opengl is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244278057" comment="qemu-pr-helper is earlier than 17:8.2.0-11.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225263044" comment="qemu-pr-helper is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244312" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:4312: openssh security update (Important)</title>
        <reference ref_id="RHSA-2024:4312" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4312"/>
        <reference ref_id="CVE-2024-6387" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6387"/>
        <reference ref_id="ALSA-2024:4312" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4312.html"/>
        <description>OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* openssh: Possible remote code execution due to a race condition in signal handling (CVE-2024-6387)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-03"/>
          <updated date="2024-07-03"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2294604" id="2294604"></bugzilla>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-6387" impact="Important" cwe="CWE-364" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2024-6387</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244312001" comment="openssh is earlier than 0:8.7p1-38.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645002" comment="openssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244312003" comment="openssh-askpass is earlier than 0:8.7p1-38.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645004" comment="openssh-askpass is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244312005" comment="openssh-clients is earlier than 0:8.7p1-38.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645006" comment="openssh-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244312007" comment="openssh-keycat is earlier than 0:8.7p1-38.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645008" comment="openssh-keycat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244312009" comment="openssh-server is earlier than 0:8.7p1-38.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645010" comment="openssh-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244312011" comment="pam_ssh_agent_auth is earlier than 0:0.10.4-5.38.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645012" comment="pam_ssh_agent_auth is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244378" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4378: podman security update (Important)</title>
        <reference ref_id="RHSA-2024:4378" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4378"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:4378" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4378.html"/>
        <description>The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

Security Fix(es):

* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-08"/>
          <updated date="2024-07-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244378010" comment="podman is earlier than 4:4.9.4-5.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954002" comment="podman is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244378011" comment="podman-plugins is earlier than 4:4.9.4-5.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954008" comment="podman-plugins is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244378012" comment="podman-remote is earlier than 4:4.9.4-5.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954010" comment="podman-remote is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244378013" comment="podman-tests is earlier than 4:4.9.4-5.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954012" comment="podman-tests is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244378014" comment="podman-docker is earlier than 4:4.9.4-5.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20227954004" comment="podman-docker is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244379" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4379: gvisor-tap-vsock security update (Important)</title>
        <reference ref_id="RHSA-2024:4379" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4379"/>
        <reference ref_id="CVE-2024-1394" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-1394"/>
        <reference ref_id="ALSA-2024:4379" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4379.html"/>
        <description>A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.

Security Fix(es):

* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-08"/>
          <updated date="2024-07-08"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262921" id="2262921"></bugzilla>
          <cve public="20240320" href="https://access.redhat.com/security/cve/CVE-2024-1394" impact="Important" cwe="CWE-401" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-1394</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20244379002" comment="gvisor-tap-vsock is earlier than 6:0.7.3-4.el9_4.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20243830004" comment="gvisor-tap-vsock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244422" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4422: fence-agents security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4422" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4422"/>
        <reference ref_id="CVE-2024-37891" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-37891"/>
        <reference ref_id="ALSA-2024:4422" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4422.html"/>
        <description>The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. 

Security Fix(es):

* urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-09"/>
          <updated date="2024-07-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2292788" id="2292788"></bugzilla>
          <cve public="20240617" href="https://access.redhat.com/security/cve/CVE-2024-37891" impact="Moderate" cwe="CWE-669" cvss3="CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N">CVE-2024-37891</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422110" comment="fence-agents-aliyun is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161002" comment="fence-agents-aliyun is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422111" comment="fence-agents-all is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161004" comment="fence-agents-all is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422112" comment="fence-agents-aws is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161012" comment="fence-agents-aws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422113" comment="fence-agents-azure-arm is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161014" comment="fence-agents-azure-arm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422114" comment="fence-agents-compute is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161026" comment="fence-agents-compute is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422115" comment="fence-agents-gce is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161036" comment="fence-agents-gce is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422116" comment="fence-agents-kdump is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161064" comment="fence-agents-kdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422117" comment="fence-agents-kubevirt is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161066" comment="fence-agents-kubevirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422118" comment="fence-agents-openstack is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161072" comment="fence-agents-openstack is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422119" comment="fence-agents-redfish is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161074" comment="fence-agents-redfish is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422120" comment="fence-agents-zvm is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161094" comment="fence-agents-zvm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422121" comment="fence-virt is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161096" comment="fence-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422122" comment="fence-virtd is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161098" comment="fence-virtd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422123" comment="fence-virtd-cpg is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161100" comment="fence-virtd-cpg is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422124" comment="fence-virtd-libvirt is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161102" comment="fence-virtd-libvirt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422125" comment="fence-virtd-multicast is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161104" comment="fence-virtd-multicast is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422126" comment="fence-virtd-serial is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161106" comment="fence-virtd-serial is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422127" comment="fence-virtd-tcp is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161108" comment="fence-virtd-tcp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422128" comment="ha-cloud-support is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161110" comment="ha-cloud-support is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422129" comment="fence-agents-amt-ws is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161006" comment="fence-agents-amt-ws is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422130" comment="fence-agents-apc is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161008" comment="fence-agents-apc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422131" comment="fence-agents-apc-snmp is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161010" comment="fence-agents-apc-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422132" comment="fence-agents-bladecenter is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161016" comment="fence-agents-bladecenter is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422133" comment="fence-agents-brocade is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161018" comment="fence-agents-brocade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422134" comment="fence-agents-cisco-mds is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161020" comment="fence-agents-cisco-mds is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422135" comment="fence-agents-cisco-ucs is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161022" comment="fence-agents-cisco-ucs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422136" comment="fence-agents-common is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161024" comment="fence-agents-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422137" comment="fence-agents-drac5 is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161028" comment="fence-agents-drac5 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422138" comment="fence-agents-eaton-snmp is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161030" comment="fence-agents-eaton-snmp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422139" comment="fence-agents-emerson is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161032" comment="fence-agents-emerson is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422140" comment="fence-agents-eps is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161034" comment="fence-agents-eps is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422141" comment="fence-agents-heuristics-ping is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161038" comment="fence-agents-heuristics-ping is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422142" comment="fence-agents-hpblade is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161040" comment="fence-agents-hpblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422143" comment="fence-agents-ibm-powervs is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161042" comment="fence-agents-ibm-powervs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422144" comment="fence-agents-ibm-vpc is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161044" comment="fence-agents-ibm-vpc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422145" comment="fence-agents-ibmblade is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161046" comment="fence-agents-ibmblade is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422146" comment="fence-agents-ifmib is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161048" comment="fence-agents-ifmib is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422147" comment="fence-agents-ilo-moonshot is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161050" comment="fence-agents-ilo-moonshot is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422148" comment="fence-agents-ilo-mp is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161052" comment="fence-agents-ilo-mp is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422149" comment="fence-agents-ilo-ssh is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161054" comment="fence-agents-ilo-ssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422150" comment="fence-agents-ilo2 is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161056" comment="fence-agents-ilo2 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422151" comment="fence-agents-intelmodular is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161058" comment="fence-agents-intelmodular is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422152" comment="fence-agents-ipdu is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161060" comment="fence-agents-ipdu is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422153" comment="fence-agents-ipmilan is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161062" comment="fence-agents-ipmilan is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422154" comment="fence-agents-lpar is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161068" comment="fence-agents-lpar is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422155" comment="fence-agents-mpath is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161070" comment="fence-agents-mpath is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422156" comment="fence-agents-rhevm is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161076" comment="fence-agents-rhevm is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422157" comment="fence-agents-rsa is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161078" comment="fence-agents-rsa is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422158" comment="fence-agents-rsb is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161080" comment="fence-agents-rsb is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422159" comment="fence-agents-sbd is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161082" comment="fence-agents-sbd is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422160" comment="fence-agents-scsi is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161084" comment="fence-agents-scsi is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422161" comment="fence-agents-virsh is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161086" comment="fence-agents-virsh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422162" comment="fence-agents-vmware-rest is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161088" comment="fence-agents-vmware-rest is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422163" comment="fence-agents-vmware-soap is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161090" comment="fence-agents-vmware-soap is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244422164" comment="fence-agents-wti is earlier than 0:4.10.0-62.el9_4.4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232161092" comment="fence-agents-wti is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248793" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8793: thunderbird security update (Moderate)</title>
        <reference ref_id="CVE-2024-10458" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10458"/>
        <reference ref_id="CVE-2024-10459" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10459"/>
        <reference ref_id="CVE-2024-10460" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10460"/>
        <reference ref_id="CVE-2024-10461" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10461"/>
        <reference ref_id="CVE-2024-10462" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10462"/>
        <reference ref_id="CVE-2024-10463" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10463"/>
        <reference ref_id="CVE-2024-10464" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10464"/>
        <reference ref_id="CVE-2024-10465" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10465"/>
        <reference ref_id="CVE-2024-10466" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10466"/>
        <reference ref_id="CVE-2024-10467" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-10467"/>
        <reference ref_id="RHSA-2024:8793" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8793"/>
        <reference ref_id="ALSA-2024:8793" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8793.html"/>
        <description>Mozilla Thunderbird is a standalone mail and newsgroup client.  

Security Fix(es):  

  * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
  * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
  * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
  * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
  * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
  * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
  * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
  * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
  * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
  * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-04"/>
          <updated date="2024-11-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2322424" id="2322424"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322425" id="2322425"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322428" id="2322428"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322429" id="2322429"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322433" id="2322433"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322434" id="2322434"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322438" id="2322438"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322439" id="2322439"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322440" id="2322440"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2322444" id="2322444"></bugzilla>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10458" impact="Important" cwe="CWE-280" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N">CVE-2024-10458</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10459" impact="Important" cwe="CWE-416" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H">CVE-2024-10459</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10460" impact="Moderate" cwe="CWE-940" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-10460</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10461" impact="Moderate" cwe="CWE-79" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-10461</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10462" impact="Moderate" cwe="CWE-280" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-10462</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10463" impact="Moderate" cwe="CWE-942" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N">CVE-2024-10463</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10464" impact="Low" cwe="CWE-799" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2024-10464</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10465" impact="Low" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N">CVE-2024-10465</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10466" impact="Low" cwe="CWE-400" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L">CVE-2024-10466</cve>
          <cve public="20241029" href="https://access.redhat.com/security/cve/CVE-2024-10467" impact="Moderate" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-10467</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20248793001" comment="thunderbird is earlier than 0:128.4.0-1.el9_4.alma.1"/>
          <criterion test_ref="oval:org.almalinux.alsa:tst:20224589002" comment="thunderbird is signed with AlmaLinux OS 9 key"/>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244439" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:4439: dotnet6.0 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4439" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4439"/>
        <reference ref_id="CVE-2024-38095" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38095"/>
        <reference ref_id="ALSA-2024:4439" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4439.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET 6.0 to SDK 6.0.132 and Runtime 6.0.32.

Security Fix(es):

* dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-09"/>
          <updated date="2024-07-09"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295323" id="2295323"></bugzilla>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-38095" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-38095</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439001" comment="aspnetcore-runtime-6.0 is earlier than 0:6.0.32-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749002" comment="aspnetcore-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439003" comment="aspnetcore-targeting-pack-6.0 is earlier than 0:6.0.32-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749004" comment="aspnetcore-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439005" comment="dotnet-apphost-pack-6.0 is earlier than 0:6.0.32-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749006" comment="dotnet-apphost-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439007" comment="dotnet-hostfxr-6.0 is earlier than 0:6.0.32-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749010" comment="dotnet-hostfxr-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439009" comment="dotnet-runtime-6.0 is earlier than 0:6.0.32-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749012" comment="dotnet-runtime-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439011" comment="dotnet-sdk-6.0 is earlier than 0:6.0.132-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749014" comment="dotnet-sdk-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439013" comment="dotnet-sdk-6.0-source-built-artifacts is earlier than 0:6.0.132-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749016" comment="dotnet-sdk-6.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439015" comment="dotnet-targeting-pack-6.0 is earlier than 0:6.0.32-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749018" comment="dotnet-targeting-pack-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244439017" comment="dotnet-templates-6.0 is earlier than 0:6.0.132-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749020" comment="dotnet-templates-6.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244450" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:4450: dotnet8.0 security update (Important)</title>
        <reference ref_id="RHSA-2024:4450" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4450"/>
        <reference ref_id="CVE-2024-30105" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-30105"/>
        <reference ref_id="CVE-2024-35264" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-35264"/>
        <reference ref_id="CVE-2024-38095" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38095"/>
        <reference ref_id="ALSA-2024:4450" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4450.html"/>
        <description>.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.

New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7.

Security Fix(es):

* dotnet: DoS in System.Text.Json (CVE-2024-30105)
* dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264)
* dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-10"/>
          <updated date="2024-07-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295320" id="2295320"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295321" id="2295321"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295323" id="2295323"></bugzilla>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-30105" impact="Important" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-30105</cve>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-35264" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2024-35264</cve>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-38095" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-38095</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450028" comment="aspnetcore-runtime-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253002" comment="aspnetcore-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450003" comment="aspnetcore-runtime-dbg-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848004" comment="aspnetcore-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450029" comment="aspnetcore-targeting-pack-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253004" comment="aspnetcore-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450030" comment="dotnet-apphost-pack-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253006" comment="dotnet-apphost-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450009" comment="dotnet-host is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749008" comment="dotnet-host is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450031" comment="dotnet-hostfxr-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253010" comment="dotnet-hostfxr-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450032" comment="dotnet-runtime-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253012" comment="dotnet-runtime-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450015" comment="dotnet-runtime-dbg-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848016" comment="dotnet-runtime-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450033" comment="dotnet-sdk-8.0 is earlier than 0:8.0.107-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253014" comment="dotnet-sdk-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450034" comment="dotnet-sdk-8.0-source-built-artifacts is earlier than 0:8.0.107-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253016" comment="dotnet-sdk-8.0-source-built-artifacts is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450021" comment="dotnet-sdk-dbg-8.0 is earlier than 0:8.0.107-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20240848022" comment="dotnet-sdk-dbg-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450035" comment="dotnet-targeting-pack-8.0 is earlier than 0:8.0.7-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253018" comment="dotnet-targeting-pack-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450036" comment="dotnet-templates-8.0 is earlier than 0:8.0.107-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20237253020" comment="dotnet-templates-8.0 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244450027" comment="netstandard-targeting-pack-2.1 is earlier than 0:8.0.107-1.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alba:tst:20225749022" comment="netstandard-targeting-pack-2.1 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244457" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4457: openssh security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4457" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4457"/>
        <reference ref_id="CVE-2024-6409" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6409"/>
        <reference ref_id="ALSA-2024:4457" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4457.html"/>
        <description>OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* openssh: Possible remote code execution due to a race condition in signal handling affecting AlmaLinux(CVE-2024-6409)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-10"/>
          <updated date="2024-07-10"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295085" id="2295085"></bugzilla>
          <cve public="20240708" href="https://access.redhat.com/security/cve/CVE-2024-6409" impact="Moderate" cwe="CWE-364" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H">CVE-2024-6409</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244457001" comment="openssh is earlier than 0:8.7p1-38.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645002" comment="openssh is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244457003" comment="openssh-askpass is earlier than 0:8.7p1-38.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645004" comment="openssh-askpass is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244457005" comment="openssh-clients is earlier than 0:8.7p1-38.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645006" comment="openssh-clients is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244457007" comment="openssh-keycat is earlier than 0:8.7p1-38.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645008" comment="openssh-keycat is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244457009" comment="openssh-server is earlier than 0:8.7p1-38.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645010" comment="openssh-server is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244457011" comment="pam_ssh_agent_auth is earlier than 0:0.10.4-5.38.el9_4.4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232645012" comment="pam_ssh_agent_auth is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244500" version="638" class="patch">
      <metadata>
        <title>ALSA-2024:4500: firefox security update (Important)</title>
        <reference ref_id="RHSA-2024:4500" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4500"/>
        <reference ref_id="CVE-2024-6601" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6601"/>
        <reference ref_id="CVE-2024-6603" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6603"/>
        <reference ref_id="CVE-2024-6604" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6604"/>
        <reference ref_id="ALSA-2024:4500" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4500.html"/>
        <description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604)
* Mozilla: Race condition in permission assignment (CVE-2024-6601)
* Mozilla: Memory corruption in thread creation (CVE-2024-6603)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-11"/>
          <updated date="2024-07-11"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2296636" id="2296636"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2296638" id="2296638"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2296639" id="2296639"></bugzilla>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-6601" impact="Moderate" cwe="CWE-281" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-6601</cve>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-6603" impact="Moderate" cwe="CWE-119" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N">CVE-2024-6603</cve>
          <cve public="20240709" href="https://access.redhat.com/security/cve/CVE-2024-6604" impact="Important" cwe="CWE-120" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-6604</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244500004" comment="firefox is earlier than 0:115.13.0-3.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20224590002" comment="firefox is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244500005" comment="firefox-x11 is earlier than 0:115.13.0-3.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20230810004" comment="firefox-x11 is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244563" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4563: java-1.8.0-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2024:4563" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4563"/>
        <reference ref_id="CVE-2024-21131" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21131"/>
        <reference ref_id="CVE-2024-21138" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21138"/>
        <reference ref_id="CVE-2024-21140" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21140"/>
        <reference ref_id="CVE-2024-21144" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21144"/>
        <reference ref_id="CVE-2024-21145" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21145"/>
        <reference ref_id="CVE-2024-21147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21147"/>
        <reference ref_id="ALSA-2024:4563" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4563.html"/>
        <description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)
* OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)
* OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)
* OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)
* OpenJDK: Pack200 increase loading time due to improper header validation (8322106) (CVE-2024-21144)
* OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-17"/>
          <updated date="2024-07-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2297961" id="2297961"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297962" id="2297962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297963" id="2297963"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297964" id="2297964"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297976" id="2297976"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297977" id="2297977"></bugzilla>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21131" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21131</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21138" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21138</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21140" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21140</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21144" impact="Moderate" cwe="CWE-20-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21144</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21145" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21145</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21147" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-21147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563001" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137002" comment="java-1.8.0-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563003" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137004" comment="java-1.8.0-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563034" comment="java-1.8.0-openjdk-demo-fastdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137006" comment="java-1.8.0-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563035" comment="java-1.8.0-openjdk-demo-slowdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137008" comment="java-1.8.0-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563009" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137010" comment="java-1.8.0-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563036" comment="java-1.8.0-openjdk-devel-fastdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137012" comment="java-1.8.0-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563037" comment="java-1.8.0-openjdk-devel-slowdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137014" comment="java-1.8.0-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563038" comment="java-1.8.0-openjdk-fastdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137016" comment="java-1.8.0-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563017" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137018" comment="java-1.8.0-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563039" comment="java-1.8.0-openjdk-headless-fastdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137020" comment="java-1.8.0-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563040" comment="java-1.8.0-openjdk-headless-slowdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137022" comment="java-1.8.0-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563041" comment="java-1.8.0-openjdk-slowdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137028" comment="java-1.8.0-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563029" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137030" comment="java-1.8.0-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563042" comment="java-1.8.0-openjdk-src-fastdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137032" comment="java-1.8.0-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563043" comment="java-1.8.0-openjdk-src-slowdebug is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137034" comment="java-1.8.0-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563023" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137024" comment="java-1.8.0-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244563025" comment="java-1.8.0-openjdk-javadoc-zip is earlier than 1:1.8.0.422.b05-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20222137026" comment="java-1.8.0-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244567" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4567: java-11-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2024:4567" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4567"/>
        <reference ref_id="CVE-2024-21131" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21131"/>
        <reference ref_id="CVE-2024-21138" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21138"/>
        <reference ref_id="CVE-2024-21140" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21140"/>
        <reference ref_id="CVE-2024-21144" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21144"/>
        <reference ref_id="CVE-2024-21145" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21145"/>
        <reference ref_id="CVE-2024-21147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21147"/>
        <reference ref_id="ALSA-2024:4567" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4567.html"/>
        <description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)
* OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)
* OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)
* OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)
* OpenJDK: Pack200 increase loading time due to improper header validation (8322106) (CVE-2024-21144)
* OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-16"/>
          <updated date="2024-07-16"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2297961" id="2297961"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297962" id="2297962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297963" id="2297963"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297964" id="2297964"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297976" id="2297976"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297977" id="2297977"></bugzilla>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21131" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21131</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21138" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21138</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21140" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21140</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21144" impact="Moderate" cwe="CWE-20-&gt;CWE-400" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21144</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21145" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21145</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21147" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-21147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567001" comment="java-11-openjdk is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728002" comment="java-11-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567003" comment="java-11-openjdk-demo is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728004" comment="java-11-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567046" comment="java-11-openjdk-demo-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728006" comment="java-11-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567007" comment="java-11-openjdk-demo-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728008" comment="java-11-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567009" comment="java-11-openjdk-devel is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728010" comment="java-11-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567047" comment="java-11-openjdk-devel-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728012" comment="java-11-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567013" comment="java-11-openjdk-devel-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728014" comment="java-11-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567048" comment="java-11-openjdk-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728016" comment="java-11-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567017" comment="java-11-openjdk-headless is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728018" comment="java-11-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567049" comment="java-11-openjdk-headless-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728020" comment="java-11-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567021" comment="java-11-openjdk-headless-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728022" comment="java-11-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567023" comment="java-11-openjdk-javadoc is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728024" comment="java-11-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567025" comment="java-11-openjdk-javadoc-zip is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728026" comment="java-11-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567027" comment="java-11-openjdk-jmods is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728028" comment="java-11-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567050" comment="java-11-openjdk-jmods-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728030" comment="java-11-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567031" comment="java-11-openjdk-jmods-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728032" comment="java-11-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567033" comment="java-11-openjdk-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728034" comment="java-11-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567035" comment="java-11-openjdk-src is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728036" comment="java-11-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567051" comment="java-11-openjdk-src-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728038" comment="java-11-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567039" comment="java-11-openjdk-src-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728040" comment="java-11-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567041" comment="java-11-openjdk-static-libs is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728042" comment="java-11-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567052" comment="java-11-openjdk-static-libs-fastdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728044" comment="java-11-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244567045" comment="java-11-openjdk-static-libs-slowdebug is earlier than 1:11.0.24.0.8-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221728046" comment="java-11-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244568" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:4568: java-17-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2024:4568" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4568"/>
        <reference ref_id="CVE-2024-21131" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21131"/>
        <reference ref_id="CVE-2024-21138" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21138"/>
        <reference ref_id="CVE-2024-21140" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21140"/>
        <reference ref_id="CVE-2024-21145" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21145"/>
        <reference ref_id="CVE-2024-21147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21147"/>
        <reference ref_id="ALSA-2024:4568" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4568.html"/>
        <description>The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)
* OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)
* OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)
* OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)
* OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-17"/>
          <updated date="2024-07-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2297961" id="2297961"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297962" id="2297962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297963" id="2297963"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297976" id="2297976"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297977" id="2297977"></bugzilla>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21131" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21131</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21138" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21138</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21140" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21140</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21145" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21145</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21147" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-21147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568001" comment="java-17-openjdk is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729002" comment="java-17-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568003" comment="java-17-openjdk-demo is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729004" comment="java-17-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568046" comment="java-17-openjdk-demo-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729006" comment="java-17-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568007" comment="java-17-openjdk-demo-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729008" comment="java-17-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568009" comment="java-17-openjdk-devel is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729010" comment="java-17-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568047" comment="java-17-openjdk-devel-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729012" comment="java-17-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568013" comment="java-17-openjdk-devel-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729014" comment="java-17-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568048" comment="java-17-openjdk-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729016" comment="java-17-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568017" comment="java-17-openjdk-headless is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729018" comment="java-17-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568049" comment="java-17-openjdk-headless-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729020" comment="java-17-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568021" comment="java-17-openjdk-headless-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729022" comment="java-17-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568023" comment="java-17-openjdk-javadoc is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729024" comment="java-17-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568025" comment="java-17-openjdk-javadoc-zip is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729026" comment="java-17-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568027" comment="java-17-openjdk-jmods is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729028" comment="java-17-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568050" comment="java-17-openjdk-jmods-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729030" comment="java-17-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568031" comment="java-17-openjdk-jmods-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729032" comment="java-17-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568033" comment="java-17-openjdk-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729034" comment="java-17-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568035" comment="java-17-openjdk-src is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729036" comment="java-17-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568051" comment="java-17-openjdk-src-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729038" comment="java-17-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568039" comment="java-17-openjdk-src-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729040" comment="java-17-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568041" comment="java-17-openjdk-static-libs is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729042" comment="java-17-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568052" comment="java-17-openjdk-static-libs-fastdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729044" comment="java-17-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244568045" comment="java-17-openjdk-static-libs-slowdebug is earlier than 1:17.0.12.0.7-2.el9"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20221729046" comment="java-17-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244573" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4573: java-21-openjdk security update (Important)</title>
        <reference ref_id="RHSA-2024:4573" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4573"/>
        <reference ref_id="CVE-2024-21131" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21131"/>
        <reference ref_id="CVE-2024-21138" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21138"/>
        <reference ref_id="CVE-2024-21140" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21140"/>
        <reference ref_id="CVE-2024-21145" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21145"/>
        <reference ref_id="CVE-2024-21147" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-21147"/>
        <reference ref_id="ALSA-2024:4573" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4573.html"/>
        <description>The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.

Security Fix(es):

* OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)
* OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)
* OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)
* OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)
* OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-17"/>
          <updated date="2024-07-17"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2297961" id="2297961"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297962" id="2297962"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297963" id="2297963"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297976" id="2297976"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2297977" id="2297977"></bugzilla>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21131" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N">CVE-2024-21131</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21138" impact="Moderate" cwe="CWE-835" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L">CVE-2024-21138</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21140" impact="Moderate" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21140</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21145" impact="Moderate" cwe="(CWE-125|CWE-787)" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N">CVE-2024-21145</cve>
          <cve public="20240716" href="https://access.redhat.com/security/cve/CVE-2024-21147" impact="Important" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-21147</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573046" comment="java-21-openjdk is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738002" comment="java-21-openjdk is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573047" comment="java-21-openjdk-demo is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738004" comment="java-21-openjdk-demo is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573048" comment="java-21-openjdk-demo-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738006" comment="java-21-openjdk-demo-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573049" comment="java-21-openjdk-demo-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738008" comment="java-21-openjdk-demo-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573050" comment="java-21-openjdk-devel is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738010" comment="java-21-openjdk-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573051" comment="java-21-openjdk-devel-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738012" comment="java-21-openjdk-devel-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573052" comment="java-21-openjdk-devel-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738014" comment="java-21-openjdk-devel-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573053" comment="java-21-openjdk-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738016" comment="java-21-openjdk-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573054" comment="java-21-openjdk-headless is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738018" comment="java-21-openjdk-headless is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573055" comment="java-21-openjdk-headless-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738020" comment="java-21-openjdk-headless-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573056" comment="java-21-openjdk-headless-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738022" comment="java-21-openjdk-headless-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573057" comment="java-21-openjdk-javadoc is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738024" comment="java-21-openjdk-javadoc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573058" comment="java-21-openjdk-javadoc-zip is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738026" comment="java-21-openjdk-javadoc-zip is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573059" comment="java-21-openjdk-jmods is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738028" comment="java-21-openjdk-jmods is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573060" comment="java-21-openjdk-jmods-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738030" comment="java-21-openjdk-jmods-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573061" comment="java-21-openjdk-jmods-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738032" comment="java-21-openjdk-jmods-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573062" comment="java-21-openjdk-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738034" comment="java-21-openjdk-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573063" comment="java-21-openjdk-src is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738036" comment="java-21-openjdk-src is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573064" comment="java-21-openjdk-src-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738038" comment="java-21-openjdk-src-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573065" comment="java-21-openjdk-src-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738040" comment="java-21-openjdk-src-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573066" comment="java-21-openjdk-static-libs is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738042" comment="java-21-openjdk-static-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573067" comment="java-21-openjdk-static-libs-fastdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738044" comment="java-21-openjdk-static-libs-fastdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244573068" comment="java-21-openjdk-static-libs-slowdebug is earlier than 1:21.0.4.0.7-1.el9.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236738046" comment="java-21-openjdk-static-libs-slowdebug is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244623" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:4623: qt5-qtbase security update (Important)</title>
        <reference ref_id="RHSA-2024:4623" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4623"/>
        <reference ref_id="CVE-2024-39936" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39936"/>
        <reference ref_id="ALSA-2024:4623" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4623.html"/>
        <description>Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. 

Security Fix(es):

* qtbase: qtbase: Delay any communication until encrypted() can be responded to (CVE-2024-39936)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-18"/>
          <updated date="2024-07-18"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295867" id="2295867"></bugzilla>
          <cve public="20240704" href="https://access.redhat.com/security/cve/CVE-2024-39936" impact="Important" cwe="CWE-367" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N">CVE-2024-39936</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623001" comment="qt5-qtbase is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369010" comment="qt5-qtbase is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623005" comment="qt5-qtbase-devel is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369014" comment="qt5-qtbase-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623007" comment="qt5-qtbase-examples is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369016" comment="qt5-qtbase-examples is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623009" comment="qt5-qtbase-gui is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369018" comment="qt5-qtbase-gui is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623011" comment="qt5-qtbase-mysql is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369020" comment="qt5-qtbase-mysql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623013" comment="qt5-qtbase-odbc is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369022" comment="qt5-qtbase-odbc is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623015" comment="qt5-qtbase-postgresql is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369024" comment="qt5-qtbase-postgresql is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623017" comment="qt5-qtbase-private-devel is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369026" comment="qt5-qtbase-private-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623019" comment="qt5-qtbase-static is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369028" comment="qt5-qtbase-static is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244623003" comment="qt5-qtbase-common is earlier than 0:5.15.9-10.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20236369012" comment="qt5-qtbase-common is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244726" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4726: httpd security update (Important)</title>
        <reference ref_id="RHSA-2024:4726" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4726"/>
        <reference ref_id="CVE-2024-38473" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38473"/>
        <reference ref_id="CVE-2024-38474" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38474"/>
        <reference ref_id="CVE-2024-38475" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38475"/>
        <reference ref_id="CVE-2024-38477" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-38477"/>
        <reference ref_id="CVE-2024-39573" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-39573"/>
        <reference ref_id="ALSA-2024:4726" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4726.html"/>
        <description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
* httpd: Encoding problem in mod_proxy (CVE-2024-38473)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-23"/>
          <updated date="2024-07-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2295012" id="2295012"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295013" id="2295013"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295014" id="2295014"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295016" id="2295016"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2295022" id="2295022"></bugzilla>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-38473" impact="Moderate" cwe="CWE-116" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N">CVE-2024-38473</cve>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-38474" impact="Important" cwe="CWE-116" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H">CVE-2024-38474</cve>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-38475" impact="Important" cwe="CWE-116" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-38475</cve>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-38477" impact="Important" cwe="CWE-476" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-38477</cve>
          <cve public="20240701" href="https://access.redhat.com/security/cve/CVE-2024-39573" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2024-39573</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726001" comment="httpd is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726022" comment="httpd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726003" comment="httpd-core is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726023" comment="httpd-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726005" comment="httpd-devel is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726024" comment="httpd-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726011" comment="httpd-tools is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726025" comment="httpd-tools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726013" comment="mod_ldap is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726026" comment="mod_ldap is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726015" comment="mod_lua is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726027" comment="mod_lua is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726017" comment="mod_proxy_html is earlier than 1:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726028" comment="mod_proxy_html is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726019" comment="mod_session is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726029" comment="mod_session is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726021" comment="mod_ssl is earlier than 1:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726030" comment="mod_ssl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726007" comment="httpd-filesystem is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726031" comment="httpd-filesystem is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726009" comment="httpd-manual is earlier than 0:2.4.57-11.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244726032" comment="httpd-manual is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20249605" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:9605: kernel security update (Moderate)</title>
        <reference ref_id="CVE-2024-42283" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-42283"/>
        <reference ref_id="CVE-2024-46824" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-46824"/>
        <reference ref_id="CVE-2024-46858" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-46858"/>
        <reference ref_id="RHSA-2024:9605" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:9605"/>
        <reference ref_id="ALSA-2024:9605" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-9605.html"/>
        <description>The kernel packages contain the Linux kernel, the core of any Linux operating system.  

Security Fix(es):  

  * kernel: net: nexthop: Initialize all fields in dumped nexthops (CVE-2024-42283)
  * kernel: iommufd: Require drivers to supply the cache_invalidate_user ops (CVE-2024-46824)
  * kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-14"/>
          <updated date="2024-11-14"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2315176" id="2315176"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2315210" id="2315210"></bugzilla>
          <cve public="20240817" href="https://access.redhat.com/security/cve/CVE-2024-42283" impact="Moderate" cwe="CWE-456" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-42283</cve>
          <cve public="20240927" href="https://access.redhat.com/security/cve/CVE-2024-46824" impact="Moderate" cvss3="CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H">CVE-2024-46824</cve>
          <cve public="20240927" href="https://access.redhat.com/security/cve/CVE-2024-46858" impact="Moderate" cwe="CWE-416" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H">CVE-2024-46858</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605001" comment="bpftool is earlier than 0:7.4.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249002" comment="bpftool is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605002" comment="kernel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225214002" comment="kernel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605003" comment="kernel-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249008" comment="kernel-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605004" comment="kernel-debug is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249012" comment="kernel-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605005" comment="kernel-debug-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249014" comment="kernel-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605006" comment="kernel-debug-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249016" comment="kernel-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605007" comment="kernel-debug-devel-matched is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249018" comment="kernel-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605008" comment="kernel-debug-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249020" comment="kernel-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605009" comment="kernel-debug-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458050" comment="kernel-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605010" comment="kernel-debug-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249022" comment="kernel-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605011" comment="kernel-debug-uki-virt is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458054" comment="kernel-debug-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605012" comment="kernel-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249024" comment="kernel-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605013" comment="kernel-devel-matched is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249026" comment="kernel-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605014" comment="kernel-headers is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249030" comment="kernel-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605015" comment="kernel-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249032" comment="kernel-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605016" comment="kernel-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458064" comment="kernel-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605017" comment="kernel-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249034" comment="kernel-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605018" comment="kernel-tools is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249036" comment="kernel-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605019" comment="kernel-tools-libs is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249038" comment="kernel-tools-libs is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605020" comment="kernel-uki-virt is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458074" comment="kernel-uki-virt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605021" comment="kernel-uki-virt-addons is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605022" comment="kernel-uki-virt-addons is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605023" comment="perf is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249054" comment="perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605024" comment="python3-perf is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249056" comment="python3-perf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605025" comment="rtla is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458094" comment="rtla is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605026" comment="rv is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162025" comment="rv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605027" comment="kernel-zfcpdump-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249044" comment="kernel-zfcpdump-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605028" comment="kernel-zfcpdump-devel-matched is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249048" comment="kernel-zfcpdump-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605029" comment="kernel-zfcpdump-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249050" comment="kernel-zfcpdump-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605030" comment="kernel-zfcpdump-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458086" comment="kernel-zfcpdump-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605031" comment="kernel-zfcpdump-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249052" comment="kernel-zfcpdump-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605032" comment="kernel-rt-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267004" comment="kernel-rt-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605033" comment="kernel-rt-debug-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267014" comment="kernel-rt-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605034" comment="kernel-rt-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267018" comment="kernel-rt-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605035" comment="kernel-rt-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148026" comment="kernel-rt-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605036" comment="kernel-64k-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458008" comment="kernel-64k-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605037" comment="kernel-64k-debug-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458012" comment="kernel-64k-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605038" comment="kernel-64k-debug-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458014" comment="kernel-64k-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605039" comment="kernel-64k-debug-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458018" comment="kernel-64k-debug-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605040" comment="kernel-cross-headers is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249010" comment="kernel-cross-headers is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605041" comment="kernel-tools-libs-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249040" comment="kernel-tools-libs-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605042" comment="libperf is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248162062" comment="libperf is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605043" comment="kernel-zfcpdump-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249046" comment="kernel-zfcpdump-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605044" comment="kernel-zfcpdump is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249042" comment="kernel-zfcpdump is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605045" comment="kernel-rt-debug-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267010" comment="kernel-rt-debug-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605046" comment="kernel-rt-debug-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267008" comment="kernel-rt-debug-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605047" comment="kernel-rt-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267022" comment="kernel-rt-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605048" comment="kernel-rt-debug-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232148016" comment="kernel-rt-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605049" comment="kernel-rt-debug-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267016" comment="kernel-rt-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605050" comment="kernel-rt-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267024" comment="kernel-rt-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605051" comment="kernel-rt-debug is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267006" comment="kernel-rt-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605052" comment="kernel-rt is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225267002" comment="kernel-rt is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605053" comment="kernel-64k-devel-matched is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458026" comment="kernel-64k-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605054" comment="kernel-64k-debug is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458010" comment="kernel-64k-debug is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605055" comment="kernel-64k is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458006" comment="kernel-64k is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605056" comment="kernel-64k-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458032" comment="kernel-64k-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605057" comment="kernel-64k-debug-devel-matched is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458016" comment="kernel-64k-debug-devel-matched is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605058" comment="kernel-64k-debug-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458020" comment="kernel-64k-debug-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605059" comment="kernel-64k-devel is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458024" comment="kernel-64k-devel is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605060" comment="kernel-64k-debug-modules-extra is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458022" comment="kernel-64k-debug-modules-extra is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605061" comment="kernel-64k-modules is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458028" comment="kernel-64k-modules is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605062" comment="kernel-64k-modules-core is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232458030" comment="kernel-64k-modules-core is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605063" comment="kernel-abi-stablelists is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249006" comment="kernel-abi-stablelists is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20249605064" comment="kernel-doc is earlier than 0:5.14.0-503.14.1.el9_5"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20225249028" comment="kernel-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244749" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:4749: edk2 security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4749" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4749"/>
        <reference ref_id="CVE-2022-36765" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2022-36765"/>
        <reference ref_id="CVE-2023-45236" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45236"/>
        <reference ref_id="CVE-2023-45237" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-45237"/>
        <reference ref_id="ALSA-2024:4749" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4749.html"/>
        <description>EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. 

Security Fix(es):

* EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W (CVE-2022-36765)
* edk2: Predictable TCP Initial Sequence Numbers (CVE-2023-45236)
* edk2: Use of a Weak PseudoRandom Number Generator (CVE-2023-45237)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-23"/>
          <updated date="2024-07-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2257584" id="2257584"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258703" id="2258703"></bugzilla>
          <bugzilla href="https://bugzilla.redhat.com/2258706" id="2258706"></bugzilla>
          <cve public="20240109" href="https://access.redhat.com/security/cve/CVE-2022-36765" impact="Moderate" cwe="CWE-680" cvss3="CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H">CVE-2022-36765</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45236" impact="Moderate" cwe="CWE-200" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45236</cve>
          <cve public="20240116" href="https://access.redhat.com/security/cve/CVE-2023-45237" impact="Moderate" cwe="CWE-338" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N">CVE-2023-45237</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244749005" comment="edk2-tools is earlier than 0:20231122-6.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165006" comment="edk2-tools is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244749001" comment="edk2-aarch64 is earlier than 0:20231122-6.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165002" comment="edk2-aarch64 is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244749003" comment="edk2-ovmf is earlier than 0:20231122-6.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165004" comment="edk2-ovmf is signed with AlmaLinux OS 9 key"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244749007" comment="edk2-tools-doc is earlier than 0:20231122-6.el9_4.2"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20232165008" comment="edk2-tools-doc is signed with AlmaLinux OS 9 key"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20248800" version="635" class="patch">
      <metadata>
        <title>ALSA-2024:8800: openexr security update (Important)</title>
        <reference ref_id="CVE-2023-5841" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2023-5841"/>
        <reference ref_id="RHSA-2024:8800" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:8800"/>
        <reference ref_id="ALSA-2024:8800" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-8800.html"/>
        <description>OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.  

Security Fix(es):  

  * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841)


For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-11-04"/>
          <updated date="2024-11-04"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2262397" id="2262397"></bugzilla>
          <cve public="20240201" href="https://access.redhat.com/security/cve/CVE-2023-5841" impact="Important" cwe="CWE-122" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N">CVE-2023-5841</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800001" comment="openexr is earlier than 0:3.1.1-2.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800002" comment="openexr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800003" comment="openexr-libs is earlier than 0:3.1.1-2.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800004" comment="openexr-libs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800005" comment="openexr-devel is earlier than 0:3.1.1-2.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20248800006" comment="openexr-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20245533" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:5533: python3.12-setuptools security update (Important)</title>
        <reference ref_id="RHSA-2024:5533" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:5533"/>
        <reference ref_id="CVE-2024-6345" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-6345"/>
        <reference ref_id="ALSA-2024:5533" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-5533.html"/>
        <description>Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages.  This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources.

Security Fix(es):

* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Important</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-08-19"/>
          <updated date="2024-08-19"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2297771" id="2297771"></bugzilla>
          <cve public="20240715" href="https://access.redhat.com/security/cve/CVE-2024-6345" impact="Important" cwe="CWE-94" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245533001" comment="python3.12-setuptools is earlier than 0:68.2.2-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245533005" comment="python3.12-setuptools is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245533003" comment="python3.12-setuptools-wheel is earlier than 0:68.2.2-3.el9_4.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20245533006" comment="python3.12-setuptools-wheel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244755" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4755: libreoffice security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4755" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4755"/>
        <reference ref_id="CVE-2024-3044" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-3044"/>
        <reference ref_id="ALSA-2024:4755" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4755.html"/>
        <description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.

Security Fix(es):

* libreoffice: create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic (CVE-2024-3044)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-23"/>
          <updated date="2024-07-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2280542" id="2280542"></bugzilla>
          <cve public="20240514" href="https://access.redhat.com/security/cve/CVE-2024-3044" impact="Moderate" cwe="CWE-20" cvss3="CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H">CVE-2024-3044</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755358" comment="libreoffice is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755359" comment="libreoffice is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755360" comment="libreoffice-base is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755361" comment="libreoffice-base is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755362" comment="libreoffice-calc is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755363" comment="libreoffice-calc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755364" comment="libreoffice-core is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755365" comment="libreoffice-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755366" comment="libreoffice-draw is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755367" comment="libreoffice-draw is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755368" comment="libreoffice-emailmerge is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755369" comment="libreoffice-emailmerge is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755370" comment="libreoffice-filters is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755371" comment="libreoffice-filters is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755372" comment="libreoffice-gdb-debug-support is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755373" comment="libreoffice-gdb-debug-support is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755374" comment="libreoffice-graphicfilter is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755375" comment="libreoffice-graphicfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755376" comment="libreoffice-gtk3 is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755377" comment="libreoffice-gtk3 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755378" comment="libreoffice-help-ar is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755379" comment="libreoffice-help-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755380" comment="libreoffice-help-bg is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755381" comment="libreoffice-help-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755382" comment="libreoffice-help-bn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755383" comment="libreoffice-help-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755384" comment="libreoffice-help-ca is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755385" comment="libreoffice-help-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755386" comment="libreoffice-help-cs is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755387" comment="libreoffice-help-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755388" comment="libreoffice-help-da is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755389" comment="libreoffice-help-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755390" comment="libreoffice-help-de is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755391" comment="libreoffice-help-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755392" comment="libreoffice-help-dz is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755393" comment="libreoffice-help-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755394" comment="libreoffice-help-el is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755395" comment="libreoffice-help-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755396" comment="libreoffice-help-en is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755397" comment="libreoffice-help-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755398" comment="libreoffice-help-eo is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755399" comment="libreoffice-help-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755400" comment="libreoffice-help-es is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755401" comment="libreoffice-help-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755402" comment="libreoffice-help-et is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755403" comment="libreoffice-help-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755404" comment="libreoffice-help-eu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755405" comment="libreoffice-help-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755406" comment="libreoffice-help-fi is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755407" comment="libreoffice-help-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755408" comment="libreoffice-help-fr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755409" comment="libreoffice-help-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755410" comment="libreoffice-help-gl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755411" comment="libreoffice-help-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755412" comment="libreoffice-help-gu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755413" comment="libreoffice-help-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755414" comment="libreoffice-help-he is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755415" comment="libreoffice-help-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755416" comment="libreoffice-help-hi is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755417" comment="libreoffice-help-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755418" comment="libreoffice-help-hr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755419" comment="libreoffice-help-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755420" comment="libreoffice-help-hu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755421" comment="libreoffice-help-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755422" comment="libreoffice-help-id is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755423" comment="libreoffice-help-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755424" comment="libreoffice-help-it is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755425" comment="libreoffice-help-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755426" comment="libreoffice-help-ja is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755427" comment="libreoffice-help-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755428" comment="libreoffice-help-ko is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755429" comment="libreoffice-help-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755430" comment="libreoffice-help-lt is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755431" comment="libreoffice-help-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755432" comment="libreoffice-help-lv is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755433" comment="libreoffice-help-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755434" comment="libreoffice-help-nb is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755435" comment="libreoffice-help-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755436" comment="libreoffice-help-nl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755437" comment="libreoffice-help-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755438" comment="libreoffice-help-nn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755439" comment="libreoffice-help-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755440" comment="libreoffice-help-pl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755441" comment="libreoffice-help-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755442" comment="libreoffice-help-pt-BR is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755443" comment="libreoffice-help-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755444" comment="libreoffice-help-pt-PT is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755445" comment="libreoffice-help-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755446" comment="libreoffice-help-ro is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755447" comment="libreoffice-help-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755448" comment="libreoffice-help-ru is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755449" comment="libreoffice-help-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755450" comment="libreoffice-help-si is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755451" comment="libreoffice-help-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755452" comment="libreoffice-help-sk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755453" comment="libreoffice-help-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755454" comment="libreoffice-help-sl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755455" comment="libreoffice-help-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755456" comment="libreoffice-help-sv is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755457" comment="libreoffice-help-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755458" comment="libreoffice-help-ta is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755459" comment="libreoffice-help-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755460" comment="libreoffice-help-tr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755461" comment="libreoffice-help-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755462" comment="libreoffice-help-uk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755463" comment="libreoffice-help-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755464" comment="libreoffice-help-zh-Hans is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755465" comment="libreoffice-help-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755466" comment="libreoffice-help-zh-Hant is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755467" comment="libreoffice-help-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755468" comment="libreoffice-impress is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755469" comment="libreoffice-impress is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755470" comment="libreoffice-langpack-af is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755471" comment="libreoffice-langpack-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755472" comment="libreoffice-langpack-ar is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755473" comment="libreoffice-langpack-ar is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755474" comment="libreoffice-langpack-as is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755475" comment="libreoffice-langpack-as is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755476" comment="libreoffice-langpack-bg is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755477" comment="libreoffice-langpack-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755478" comment="libreoffice-langpack-bn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755479" comment="libreoffice-langpack-bn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755480" comment="libreoffice-langpack-br is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755481" comment="libreoffice-langpack-br is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755482" comment="libreoffice-langpack-ca is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755483" comment="libreoffice-langpack-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755484" comment="libreoffice-langpack-cs is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755485" comment="libreoffice-langpack-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755486" comment="libreoffice-langpack-cy is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755487" comment="libreoffice-langpack-cy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755488" comment="libreoffice-langpack-da is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755489" comment="libreoffice-langpack-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755490" comment="libreoffice-langpack-de is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755491" comment="libreoffice-langpack-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755492" comment="libreoffice-langpack-dz is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755493" comment="libreoffice-langpack-dz is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755494" comment="libreoffice-langpack-el is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755495" comment="libreoffice-langpack-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755496" comment="libreoffice-langpack-en is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755497" comment="libreoffice-langpack-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755498" comment="libreoffice-langpack-eo is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755499" comment="libreoffice-langpack-eo is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755500" comment="libreoffice-langpack-es is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755501" comment="libreoffice-langpack-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755502" comment="libreoffice-langpack-et is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755503" comment="libreoffice-langpack-et is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755504" comment="libreoffice-langpack-eu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755505" comment="libreoffice-langpack-eu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755506" comment="libreoffice-langpack-fa is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755507" comment="libreoffice-langpack-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755508" comment="libreoffice-langpack-fi is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755509" comment="libreoffice-langpack-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755510" comment="libreoffice-langpack-fr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755511" comment="libreoffice-langpack-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755512" comment="libreoffice-langpack-fy is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755513" comment="libreoffice-langpack-fy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755514" comment="libreoffice-langpack-ga is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755515" comment="libreoffice-langpack-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755516" comment="libreoffice-langpack-gl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755517" comment="libreoffice-langpack-gl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755518" comment="libreoffice-langpack-gu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755519" comment="libreoffice-langpack-gu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755520" comment="libreoffice-langpack-he is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755521" comment="libreoffice-langpack-he is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755522" comment="libreoffice-langpack-hi is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755523" comment="libreoffice-langpack-hi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755524" comment="libreoffice-langpack-hr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755525" comment="libreoffice-langpack-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755526" comment="libreoffice-langpack-hu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755527" comment="libreoffice-langpack-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755528" comment="libreoffice-langpack-id is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755529" comment="libreoffice-langpack-id is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755530" comment="libreoffice-langpack-it is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755531" comment="libreoffice-langpack-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755532" comment="libreoffice-langpack-ja is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755533" comment="libreoffice-langpack-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755534" comment="libreoffice-langpack-kk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755535" comment="libreoffice-langpack-kk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755536" comment="libreoffice-langpack-kn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755537" comment="libreoffice-langpack-kn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755538" comment="libreoffice-langpack-ko is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755539" comment="libreoffice-langpack-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755540" comment="libreoffice-langpack-lt is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755541" comment="libreoffice-langpack-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755542" comment="libreoffice-langpack-lv is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755543" comment="libreoffice-langpack-lv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755544" comment="libreoffice-langpack-mai is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755545" comment="libreoffice-langpack-mai is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755546" comment="libreoffice-langpack-ml is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755547" comment="libreoffice-langpack-ml is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755548" comment="libreoffice-langpack-mr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755549" comment="libreoffice-langpack-mr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755550" comment="libreoffice-langpack-nb is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755551" comment="libreoffice-langpack-nb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755552" comment="libreoffice-langpack-nl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755553" comment="libreoffice-langpack-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755554" comment="libreoffice-langpack-nn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755555" comment="libreoffice-langpack-nn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755556" comment="libreoffice-langpack-nr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755557" comment="libreoffice-langpack-nr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755558" comment="libreoffice-langpack-nso is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755559" comment="libreoffice-langpack-nso is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755560" comment="libreoffice-langpack-or is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755561" comment="libreoffice-langpack-or is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755562" comment="libreoffice-langpack-pa is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755563" comment="libreoffice-langpack-pa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755564" comment="libreoffice-langpack-pl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755565" comment="libreoffice-langpack-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755566" comment="libreoffice-langpack-pt-BR is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755567" comment="libreoffice-langpack-pt-BR is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755568" comment="libreoffice-langpack-pt-PT is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755569" comment="libreoffice-langpack-pt-PT is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755570" comment="libreoffice-langpack-ro is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755571" comment="libreoffice-langpack-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755572" comment="libreoffice-langpack-ru is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755573" comment="libreoffice-langpack-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755574" comment="libreoffice-langpack-si is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755575" comment="libreoffice-langpack-si is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755576" comment="libreoffice-langpack-sk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755577" comment="libreoffice-langpack-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755578" comment="libreoffice-langpack-sl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755579" comment="libreoffice-langpack-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755580" comment="libreoffice-langpack-sr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755581" comment="libreoffice-langpack-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755582" comment="libreoffice-langpack-ss is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755583" comment="libreoffice-langpack-ss is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755584" comment="libreoffice-langpack-st is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755585" comment="libreoffice-langpack-st is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755586" comment="libreoffice-langpack-sv is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755587" comment="libreoffice-langpack-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755588" comment="libreoffice-langpack-ta is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755589" comment="libreoffice-langpack-ta is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755590" comment="libreoffice-langpack-te is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755591" comment="libreoffice-langpack-te is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755592" comment="libreoffice-langpack-th is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755593" comment="libreoffice-langpack-th is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755594" comment="libreoffice-langpack-tn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755595" comment="libreoffice-langpack-tn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755596" comment="libreoffice-langpack-tr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755597" comment="libreoffice-langpack-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755598" comment="libreoffice-langpack-ts is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755599" comment="libreoffice-langpack-ts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755600" comment="libreoffice-langpack-uk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755601" comment="libreoffice-langpack-uk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755602" comment="libreoffice-langpack-ve is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755603" comment="libreoffice-langpack-ve is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755604" comment="libreoffice-langpack-xh is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755605" comment="libreoffice-langpack-xh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755606" comment="libreoffice-langpack-zh-Hans is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755607" comment="libreoffice-langpack-zh-Hans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755608" comment="libreoffice-langpack-zh-Hant is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755609" comment="libreoffice-langpack-zh-Hant is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755610" comment="libreoffice-langpack-zu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755611" comment="libreoffice-langpack-zu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755612" comment="libreoffice-math is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755613" comment="libreoffice-math is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755614" comment="libreoffice-ogltrans is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755615" comment="libreoffice-ogltrans is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755616" comment="libreoffice-pdfimport is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755617" comment="libreoffice-pdfimport is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755618" comment="libreoffice-pyuno is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755619" comment="libreoffice-pyuno is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755620" comment="libreoffice-sdk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755621" comment="libreoffice-sdk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755622" comment="libreoffice-sdk-doc is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755623" comment="libreoffice-sdk-doc is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755624" comment="libreoffice-ure is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755625" comment="libreoffice-ure is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755626" comment="libreoffice-wiki-publisher is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755627" comment="libreoffice-wiki-publisher is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755628" comment="libreoffice-writer is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755629" comment="libreoffice-writer is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755630" comment="libreoffice-x11 is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755631" comment="libreoffice-x11 is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755632" comment="libreoffice-xsltfilter is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755633" comment="libreoffice-xsltfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755634" comment="libreofficekit is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755635" comment="libreofficekit is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755636" comment="autocorr-af is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755637" comment="autocorr-af is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755638" comment="autocorr-bg is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755639" comment="autocorr-bg is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755640" comment="autocorr-ca is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755641" comment="autocorr-ca is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755642" comment="autocorr-cs is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755643" comment="autocorr-cs is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755644" comment="autocorr-da is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755645" comment="autocorr-da is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755646" comment="autocorr-de is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755647" comment="autocorr-de is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755648" comment="autocorr-dsb is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755649" comment="autocorr-dsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755650" comment="autocorr-el is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755651" comment="autocorr-el is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755652" comment="autocorr-en is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755653" comment="autocorr-en is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755654" comment="autocorr-es is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755655" comment="autocorr-es is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755656" comment="autocorr-fa is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755657" comment="autocorr-fa is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755658" comment="autocorr-fi is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755659" comment="autocorr-fi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755660" comment="autocorr-fr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755661" comment="autocorr-fr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755662" comment="autocorr-ga is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755663" comment="autocorr-ga is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755664" comment="autocorr-hr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755665" comment="autocorr-hr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755666" comment="autocorr-hsb is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755667" comment="autocorr-hsb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755668" comment="autocorr-hu is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755669" comment="autocorr-hu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755670" comment="autocorr-is is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755671" comment="autocorr-is is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755672" comment="autocorr-it is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755673" comment="autocorr-it is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755674" comment="autocorr-ja is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755675" comment="autocorr-ja is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755676" comment="autocorr-ko is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755677" comment="autocorr-ko is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755678" comment="autocorr-lb is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755679" comment="autocorr-lb is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755680" comment="autocorr-lt is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755681" comment="autocorr-lt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755682" comment="autocorr-mn is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755683" comment="autocorr-mn is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755684" comment="autocorr-nl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755685" comment="autocorr-nl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755686" comment="autocorr-pl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755687" comment="autocorr-pl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755688" comment="autocorr-pt is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755689" comment="autocorr-pt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755690" comment="autocorr-ro is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755691" comment="autocorr-ro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755692" comment="autocorr-ru is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755693" comment="autocorr-ru is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755694" comment="autocorr-sk is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755695" comment="autocorr-sk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755696" comment="autocorr-sl is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755697" comment="autocorr-sl is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755698" comment="autocorr-sr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755699" comment="autocorr-sr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755700" comment="autocorr-sv is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755701" comment="autocorr-sv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755702" comment="autocorr-tr is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755703" comment="autocorr-tr is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755704" comment="autocorr-vi is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755705" comment="autocorr-vi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755706" comment="autocorr-vro is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755707" comment="autocorr-vro is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755708" comment="autocorr-zh is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755709" comment="autocorr-zh is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755710" comment="libreoffice-data is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755711" comment="libreoffice-data is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755712" comment="libreoffice-opensymbol-fonts is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755713" comment="libreoffice-opensymbol-fonts is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755714" comment="libreoffice-ure-common is earlier than 1:7.1.8.1-13.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244755715" comment="libreoffice-ure-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244756" version="636" class="patch">
      <metadata>
        <title>ALSA-2024:4756: libuv security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4756" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4756"/>
        <reference ref_id="CVE-2024-24806" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-24806"/>
        <reference ref_id="ALSA-2024:4756" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4756.html"/>
        <description>libuv is a multi-platform support library with a focus on asynchronous I/O. 

Security Fix(es):

* libuv: Improper Domain Lookup that potentially leads to SSRF attacks (CVE-2024-24806)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-23"/>
          <updated date="2024-07-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2263292" id="2263292"></bugzilla>
          <cve public="20240207" href="https://access.redhat.com/security/cve/CVE-2024-24806" impact="Moderate" cwe="CWE-918" cvss3="CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L">CVE-2024-24806</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244756001" comment="libuv is earlier than 1:1.42.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244756005" comment="libuv is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244756003" comment="libuv-devel is earlier than 1:1.42.0-2.el9_4"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244756006" comment="libuv-devel is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
          </criteria>
        </criteria>
      </criteria>
    </definition>
    <definition id="oval:org.almalinux.alsa:def:20244757" version="637" class="patch">
      <metadata>
        <title>ALSA-2024:4757: libvirt security update (Moderate)</title>
        <reference ref_id="RHSA-2024:4757" source="RHSA" ref_url="https://access.redhat.com/errata/RHSA-2024:4757"/>
        <reference ref_id="CVE-2024-4418" source="CVE" ref_url="https://access.redhat.com/security/cve/CVE-2024-4418"/>
        <reference ref_id="ALSA-2024:4757" source="ALSA" ref_url="https://errata.almalinux.org/9/ALSA-2024-4757.html"/>
        <description>Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.

Security Fix(es):

* libvirt: stack use-after-free in virNetClientIOEventLoop() (CVE-2024-4418)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.</description>
        <advisory from="packager@almalinux.org">
          <severity>Moderate</severity>
          <rights>Copyright 2024 AlmaLinux OS</rights>
          <issued date="2024-07-23"/>
          <updated date="2024-07-23"/>
          <affected_cpe_list>
            <cpe>cpe:/a:almalinux:almalinux:9</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::appstream</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::crb</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::highavailability</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::nfv</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::realtime</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::resilientstorage</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::sap_hana</cpe>
            <cpe>cpe:/a:almalinux:almalinux:9::supplementary</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9</cpe>
            <cpe>cpe:/o:almalinux:almalinux:9::baseos</cpe>
          </affected_cpe_list>
          <bugzilla href="https://bugzilla.redhat.com/2278616" id="2278616"></bugzilla>
          <cve public="20240502" href="https://access.redhat.com/security/cve/CVE-2024-4418" impact="Moderate" cwe="CWE-362-&gt;CWE-416" cvss3="CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H">CVE-2024-4418</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion test_ref="oval:org.almalinux.alba:tst:20225749024" comment="AlmaLinux must be installed"/>
        <criteria operator="AND">
          <criterion test_ref="oval:org.almalinux.alba:tst:20225749023" comment="AlmaLinux 9 is installed"/>
          <criteria operator="OR">
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757062" comment="libvirt is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757063" comment="libvirt is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757064" comment="libvirt-client is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757065" comment="libvirt-client is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757066" comment="libvirt-client-qemu is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757067" comment="libvirt-client-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757068" comment="libvirt-daemon is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757069" comment="libvirt-daemon is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757070" comment="libvirt-daemon-common is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757071" comment="libvirt-daemon-common is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757072" comment="libvirt-daemon-config-network is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757073" comment="libvirt-daemon-config-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757074" comment="libvirt-daemon-config-nwfilter is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757075" comment="libvirt-daemon-config-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757076" comment="libvirt-daemon-driver-interface is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757077" comment="libvirt-daemon-driver-interface is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757078" comment="libvirt-daemon-driver-network is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757079" comment="libvirt-daemon-driver-network is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757080" comment="libvirt-daemon-driver-nodedev is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757081" comment="libvirt-daemon-driver-nodedev is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757082" comment="libvirt-daemon-driver-nwfilter is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757083" comment="libvirt-daemon-driver-nwfilter is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757084" comment="libvirt-daemon-driver-qemu is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757085" comment="libvirt-daemon-driver-qemu is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757086" comment="libvirt-daemon-driver-secret is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757087" comment="libvirt-daemon-driver-secret is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757088" comment="libvirt-daemon-driver-storage is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757089" comment="libvirt-daemon-driver-storage is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757090" comment="libvirt-daemon-driver-storage-core is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757091" comment="libvirt-daemon-driver-storage-core is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757092" comment="libvirt-daemon-driver-storage-disk is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757093" comment="libvirt-daemon-driver-storage-disk is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757094" comment="libvirt-daemon-driver-storage-iscsi is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757095" comment="libvirt-daemon-driver-storage-iscsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757096" comment="libvirt-daemon-driver-storage-logical is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757097" comment="libvirt-daemon-driver-storage-logical is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757098" comment="libvirt-daemon-driver-storage-mpath is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757099" comment="libvirt-daemon-driver-storage-mpath is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757100" comment="libvirt-daemon-driver-storage-rbd is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757101" comment="libvirt-daemon-driver-storage-rbd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757102" comment="libvirt-daemon-driver-storage-scsi is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757103" comment="libvirt-daemon-driver-storage-scsi is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757104" comment="libvirt-daemon-kvm is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757105" comment="libvirt-daemon-kvm is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757106" comment="libvirt-daemon-lock is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757107" comment="libvirt-daemon-lock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757108" comment="libvirt-daemon-log is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757109" comment="libvirt-daemon-log is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757110" comment="libvirt-daemon-plugin-lockd is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757111" comment="libvirt-daemon-plugin-lockd is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757112" comment="libvirt-daemon-plugin-sanlock is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757113" comment="libvirt-daemon-plugin-sanlock is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757114" comment="libvirt-daemon-proxy is earlier than 0:10.0.0-6.6.el9_4.alma.1"/>
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757115" comment="libvirt-daemon-proxy is signed with AlmaLinux OS 9 key (d36cb86cb86b3716)"/>
            </criteria>
            <criteria operator="AND">
              <criterion test_ref="oval:org.almalinux.alsa:tst:20244757116" comment="libvirt-devel is earlier than 0:10.0.0-6.6.el9_4.al