<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2024-09-21T19:09:12</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:20140927" version="501" class="patch">
<metadata>
<title>
ELSA-2014-0927:  qemu-kvm security and bug fix update (MODERATE)
</title>
<affected family="unix">
<platform>Oracle Linux 7</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2014-0927" ref_url="https://linux.oracle.com/errata/ELSA-2014-0927.html"/>
<reference source="CVE" ref_id="CVE-2013-4529" ref_url="https://linux.oracle.com/cve/CVE-2013-4529.html"/>
<reference source="CVE" ref_id="CVE-2013-4542" ref_url="https://linux.oracle.com/cve/CVE-2013-4542.html"/>
<reference source="CVE" ref_id="CVE-2014-0223" ref_url="https://linux.oracle.com/cve/CVE-2014-0223.html"/>
<reference source="CVE" ref_id="CVE-2014-3461" ref_url="https://linux.oracle.com/cve/CVE-2014-3461.html"/>
<reference source="CVE" ref_id="CVE-2013-6399" ref_url="https://linux.oracle.com/cve/CVE-2013-6399.html"/>
<reference source="CVE" ref_id="CVE-2013-4149" ref_url="https://linux.oracle.com/cve/CVE-2013-4149.html"/>
<reference source="CVE" ref_id="CVE-2013-4150" ref_url="https://linux.oracle.com/cve/CVE-2013-4150.html"/>
<reference source="CVE" ref_id="CVE-2013-4151" ref_url="https://linux.oracle.com/cve/CVE-2013-4151.html"/>
<reference source="CVE" ref_id="CVE-2013-4541" ref_url="https://linux.oracle.com/cve/CVE-2013-4541.html"/>
<reference source="CVE" ref_id="CVE-2014-0182" ref_url="https://linux.oracle.com/cve/CVE-2014-0182.html"/>
<reference source="CVE" ref_id="CVE-2013-4148" ref_url="https://linux.oracle.com/cve/CVE-2013-4148.html"/>
<reference source="CVE" ref_id="CVE-2013-4527" ref_url="https://linux.oracle.com/cve/CVE-2013-4527.html"/>
<reference source="CVE" ref_id="CVE-2014-0222" ref_url="https://linux.oracle.com/cve/CVE-2014-0222.html"/>
<reference source="CVE" ref_id="CVE-2013-4535" ref_url="https://linux.oracle.com/cve/CVE-2013-4535.html"/>
<reference source="CVE" ref_id="CVE-2013-4536" ref_url="https://linux.oracle.com/cve/CVE-2013-4536.html"/>

<description>
[1.5.3-60.el7_0.5]
- kvm-Allow-mismatched-virtio-config-len.patch [bz#1095782]
- Resolves: bz#1095782
  (CVE-2014-0182 qemu-kvm: qemu: virtio: out-of-bounds buffer write on state load with invalid config_len [rhel-7.0.z])

[1.5.3-60.el7_0.4]
- kvm-zero-initialize-KVM_SET_GSI_ROUTING-input.patch [bz#1110693]
- kvm-skip-system-call-when-msi-route-is-unchanged.patch [bz#1110693]
- Resolves: bz#1110693
  (2x RHEL 5.10 VM running on RHEL 7 KVM have low TCP_STREAM throughput)

[1.5.3-60.el7_0.3]
- kvm-virtio-net-fix-buffer-overflow-on-invalid-state-load.patch [bz#1095677]
- kvm-virtio-net-out-of-bounds-buffer-write-on-load.patch [bz#1095684]
- kvm-virtio-net-out-of-bounds-buffer-write-on-invalid-sta.patch [bz#1095689]
- kvm-virtio-out-of-bounds-buffer-write-on-invalid-state-l.patch [bz#1095694]
- kvm-virtio-avoid-buffer-overrun-on-incoming-migration.patch [bz#1095737]
- kvm-virtio-scsi-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095741]
- kvm-virtio-validate-config_len-on-load.patch [bz#1095782]
- kvm-virtio-validate-num_sg-when-mapping.patch [bz#1095765]
- kvm-virtio-allow-mapping-up-to-max-queue-size.patch [bz#1095765]
- kvm-vmstate-add-VMS_MUST_EXIST.patch [bz#1095706]
- kvm-vmstate-add-VMSTATE_VALIDATE.patch [bz#1095706]
- kvm-hpet-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095706]
- kvm-hw-pci-pcie_aer.c-fix-buffer-overruns-on-invalid-sta.patch [bz#1095714]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_load.patch [bz#1095746]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_l2.patch [bz#1095746]
- kvm-usb-fix-up-post-load-checks.patch [bz#1096828]
- kvm-XBZRLE-Fix-qemu-crash-when-resize-the-xbzrle-cache.patch [bz#1110191]
- kvm-Provide-init-function-for-ram-migration.patch [bz#1110191]
- kvm-Init-the-XBZRLE.lock-in-ram_mig_init.patch [bz#1110191]
- kvm-XBZRLE-Fix-one-XBZRLE-corruption-issues.patch [bz#1110191]
- kvm-Count-used-RAMBlock-pages-for-migration_dirty_pages.patch [bz#1110189]
- kvm-qcow-correctly-propagate-errors.patch [bz#1097229]
- kvm-qcow1-Make-padding-in-the-header-explicit.patch [bz#1097229]
- kvm-qcow1-Check-maximum-cluster-size.patch [bz#1097229]
- kvm-qcow1-Validate-L2-table-size-CVE-2014-0222.patch [bz#1097229]
- kvm-qcow1-Validate-image-size-CVE-2014-0223.patch [bz#1097236]
- kvm-qcow1-Stricter-backing-file-length-check.patch [bz#1097236]
- kvm-char-restore-read-callback-on-a-reattached-hotplug-c.patch [bz#1110219]
- kvm-qcow2-Free-preallocated-zero-clusters.patch [bz#1110188]
- kvm-qemu-iotests-Discard-preallocated-zero-clusters.patch [bz#1110188]
- Resolves: bz#1095677
  (CVE-2013-4148 qemu-kvm: qemu: virtio-net: buffer overflow on invalid state load [rhel-7.0.z])
- Resolves: bz#1095684
  (CVE-2013-4149 qemu-kvm: qemu: virtio-net: out-of-bounds buffer write on load [rhel-7.0.z])
- Resolves: bz#1095689
  (CVE-2013-4150 qemu-kvm: qemu: virtio-net: out-of-bounds buffer write on invalid state load [rhel-7.0.z])
- Resolves: bz#1095694
  (CVE-2013-4151 qemu-kvm: qemu: virtio: out-of-bounds buffer write on invalid state load [rhel-7.0.z])
- Resolves: bz#1095706
  (CVE-2013-4527 qemu-kvm: qemu: hpet: buffer overrun on invalid state load [rhel-7.0.z])
- Resolves: bz#1095714
  (CVE-2013-4529 qemu-kvm: qemu: hw/pci/pcie_aer.c: buffer overrun on invalid state load [rhel-7.0.z])
- Resolves: bz#1095737
  (CVE-2013-6399 qemu-kvm: qemu: virtio: buffer overrun on incoming migration [rhel-7.0.z])
- Resolves: bz#1095741
  (CVE-2013-4542 qemu-kvm: qemu: virtio-scsi: buffer overrun on invalid state load [rhel-7.0.z])
- Resolves: bz#1095746
  (CVE-2013-4541 qemu-kvm: qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load [rhel-7.0.z])
- Resolves: bz#1095765
  (CVE-2013-4535 CVE-2013-4536 qemu-kvm: qemu: virtio: insufficient validation of num_sg when mapping [rhel-7.0.z])
- Resolves: bz#1095782
  (CVE-2014-0182 qemu-kvm: qemu: virtio: out-of-bounds buffer write on state load with invalid config_len [rhel-7.0.z])
- Resolves: bz#1096828
  (CVE-2014-3461 qemu-kvm: Qemu: usb: fix up post load checks [rhel-7.0.z])
- Resolves: bz#1097229
  (CVE-2014-0222 qemu-kvm: Qemu: qcow1: validate L2 table size to avoid integer overflows [rhel-7.0.z])
- Resolves: bz#1097236
  (CVE-2014-0223 qemu-kvm: Qemu: qcow1: validate image size to avoid out-of-bounds memory access [rhel-7.0.z])
- Resolves: bz#1110188
  (qcow2 corruptions (leaked clusters after installing a rhel7 guest using virtio_scsi))
- Resolves: bz#1110189
  (migration can not finish with 1024k 'remaining ram' left after hotunplug 4 nics)
- Resolves: bz#1110191
  (Reduce the migrate cache size during migration causes qemu segment fault)
- Resolves: bz#1110219
  (Guest can't receive any character transmitted from host after hot unplugging virtserialport then hot plugging again)
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>MODERATE</severity>
<rights>Copyright 2014 Oracle, Inc.</rights>
<issued date="2014-07-23"/>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4529.html" public="20131203">CVE-2013-4529</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4542.html" public="20131203">CVE-2013-4542</cve>
<cve cvss2="4.3/AV:A/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2014-0223.html" public="20140512">CVE-2014-0223</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2014-3461.html" public="20140512">CVE-2014-3461</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-6399.html" public="20131203">CVE-2013-6399</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4149.html" public="20131203">CVE-2013-4149</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4150.html" public="20131203">CVE-2013-4150</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4151.html" public="20131203">CVE-2013-4151</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4541.html" public="20131203">CVE-2013-4541</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2014-0182.html" public="20140417">CVE-2014-0182</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4148.html" public="20131203">CVE-2013-4148</cve>
<cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2013-4527.html" public="20131203">CVE-2013-4527</cve>
<cve cvss2="4.3/AV:A/AC:H/Au:N/C:P/I:P/A:P" href="https://linux.oracle.com/cve/CVE-2014-0222.html" public="20140512">CVE-2014-0222</cve>
<cve cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2013-4535.html" public="20200211">CVE-2013-4535</cve>
<cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2013-4536.html" public="20210528">CVE-2013-4536</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:7:0:patch</cpe>
<cpe>cpe:/a:oracle:linux:7::optional_archive</cpe>
<cpe>cpe:/a:oracle:linux:7::latest_archive</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927001" comment="Oracle Linux 7 is installed"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927002" comment="Oracle Linux arch is x86_64"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927003" comment="libcacard is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927004" comment="libcacard is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927005" comment="libcacard-devel is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927006" comment="libcacard-devel is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927007" comment="libcacard-tools is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927008" comment="libcacard-tools is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927009" comment="qemu-guest-agent is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927010" comment="qemu-guest-agent is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927011" comment="qemu-img is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927012" comment="qemu-img is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927013" comment="qemu-kvm is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927014" comment="qemu-kvm is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927015" comment="qemu-kvm-common is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927016" comment="qemu-kvm-common is signed with the Oracle Linux 7 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20140927017" comment="qemu-kvm-tools is earlier than 10:1.5.3-60.el7_0.5"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20140927018" comment="qemu-kvm-tools is signed with the Oracle Linux 7 key"/>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927001"  version="501" comment="Oracle Linux 7 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927001" />
<state state_ref="oval:com.oracle.elsa:ste:20140927002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927002"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927001" />
<state state_ref="oval:com.oracle.elsa:ste:20140927003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927003"  version="501" comment="libcacard is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927002" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927004"  version="501" comment="libcacard is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927002" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927005"  version="501" comment="libcacard-devel is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927003" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927006"  version="501" comment="libcacard-devel is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927003" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927007"  version="501" comment="libcacard-tools is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927004" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927008"  version="501" comment="libcacard-tools is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927004" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927009"  version="501" comment="qemu-guest-agent is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927005" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927010"  version="501" comment="qemu-guest-agent is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927005" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927011"  version="501" comment="qemu-img is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927006" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927012"  version="501" comment="qemu-img is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927006" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927013"  version="501" comment="qemu-kvm is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927007" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927014"  version="501" comment="qemu-kvm is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927007" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927015"  version="501" comment="qemu-kvm-common is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927008" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927016"  version="501" comment="qemu-kvm-common is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927008" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927017"  version="501" comment="qemu-kvm-tools is earlier than 10:1.5.3-60.el7_0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927009" />
<state state_ref="oval:com.oracle.elsa:ste:20140927004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20140927018"  version="501" comment="qemu-kvm-tools is signed with the Oracle Linux 7 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20140927009" />
<state state_ref="oval:com.oracle.elsa:ste:20140927001" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927008" version="501">
<name>qemu-kvm-common</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927003" version="501">
<name>libcacard-devel</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927004" version="501">
<name>libcacard-tools</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927007" version="501">
<name>qemu-kvm</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927005" version="501">
<name>qemu-guest-agent</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927006" version="501">
<name>qemu-img</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927002" version="501">
<name>libcacard</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20140927009" version="501">
<name>qemu-kvm-tools</name>
</rpminfo_object>

</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20140927001" version="501">
<signature_keyid operation="equals">72f97b74ec551f03</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20140927002" version="501">
<version operation="pattern match">^7</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20140927003" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20140927004" version="501">
<evr datatype="evr_string" operation="less than">10:1.5.3-60.el7_0.5</evr>
</rpminfo_state>

</states>
</oval_definitions>
