<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2024-09-21T18:50:43</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:20190968" version="501" class="patch">
<metadata>
<title>
ELSA-2019-0968:  edk2 security update (IMPORTANT)
</title>
<affected family="unix">
<platform>Oracle Linux 8</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2019-0968" ref_url="https://linux.oracle.com/errata/ELSA-2019-0968.html"/>
<reference source="CVE" ref_id="CVE-2018-12180" ref_url="https://linux.oracle.com/cve/CVE-2018-12180.html"/>

<description>
[20180508gitee3198e672e2-9.el8_0]
- edk2-MdeModulePkg-PartitionDxe-Ensure-blocksize-holds-MBR.patch [bz#1690501]
- edk2-MdeModulePkg-RamDiskDxe-Restrict-on-RAM-disk-size-CV.patch [bz#1690501]
- Resolves: bz#1690501
  (CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk [rhel-8.0.0.z])
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>IMPORTANT</severity>
<rights>Copyright 2019 Oracle, Inc.</rights>
<issued date="2019-07-30"/>
<cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12180.html" public="20190327">CVE-2018-12180</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:8::appstream</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20190968001" comment="Oracle Linux 8 is installed"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20190968002" comment="Oracle Linux arch is aarch64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20190968003" comment="edk2-aarch64 is earlier than 0:20180508gitee3198e672e2-9.el8_0.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20190968004" comment="edk2-aarch64 is signed with the Oracle Linux 8 key"/>
</criteria>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20190968005" comment="Oracle Linux arch is x86_64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20190968006" comment="edk2-ovmf is earlier than 0:20180508gitee3198e672e2-9.el8_0.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20190968007" comment="edk2-ovmf is signed with the Oracle Linux 8 key"/>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968001"  version="501" comment="Oracle Linux 8 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968001" />
<state state_ref="oval:com.oracle.elsa:ste:20190968002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968002"  version="501" comment="Oracle Linux arch is aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968001" />
<state state_ref="oval:com.oracle.elsa:ste:20190968003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968003"  version="501" comment="edk2-aarch64 is earlier than 0:20180508gitee3198e672e2-9.el8_0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968002" />
<state state_ref="oval:com.oracle.elsa:ste:20190968004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968004"  version="501" comment="edk2-aarch64 is signed with the Oracle Linux 8 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968002" />
<state state_ref="oval:com.oracle.elsa:ste:20190968001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968005"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968001" />
<state state_ref="oval:com.oracle.elsa:ste:20190968005" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968006"  version="501" comment="edk2-ovmf is earlier than 0:20180508gitee3198e672e2-9.el8_0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968003" />
<state state_ref="oval:com.oracle.elsa:ste:20190968004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20190968007"  version="501" comment="edk2-ovmf is signed with the Oracle Linux 8 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20190968003" />
<state state_ref="oval:com.oracle.elsa:ste:20190968001" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20190968002" version="501">
<name>edk2-aarch64</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20190968003" version="501">
<name>edk2-ovmf</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20190968001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>

</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20190968001" version="501">
<signature_keyid operation="equals">82562ea9ad986da3</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20190968002" version="501">
<version operation="pattern match">^8</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20190968003" version="501">
<arch operation="pattern match">aarch64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20190968004" version="501">
<evr datatype="evr_string" operation="less than">0:20180508gitee3198e672e2-9.el8_0.1</evr>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20190968005" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>

</states>
</oval_definitions>
