<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2025-11-26T11:27:19</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:202520962" version="501" class="patch">
<metadata>
<title>
ELSA-2025-20962:  pcs security update (IMPORTANT)
</title>
<affected family="unix">
<platform>Oracle Linux 9</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2025-20962" ref_url="https://linux.oracle.com/errata/ELSA-2025-20962.html"/>
<reference source="CVE" ref_id="CVE-2025-59830" ref_url="https://linux.oracle.com/cve/CVE-2025-59830.html"/>
<reference source="CVE" ref_id="CVE-2025-61770" ref_url="https://linux.oracle.com/cve/CVE-2025-61770.html"/>
<reference source="CVE" ref_id="CVE-2025-61771" ref_url="https://linux.oracle.com/cve/CVE-2025-61771.html"/>
<reference source="CVE" ref_id="CVE-2025-61772" ref_url="https://linux.oracle.com/cve/CVE-2025-61772.html"/>
<reference source="CVE" ref_id="CVE-2025-61919" ref_url="https://linux.oracle.com/cve/CVE-2025-61919.html"/>

<description>
[0.11.10-1.el9_7.1]
- Fixed CVE-2025-59830, CVE-2025-61770, CVE-2025-61771, CVE-2025-61772, CVE-2025-61919 by updating bundled rubygem rack
  Resolves: RHEL-120945, RHEL-121035, RHEL-123630, RHEL-123642, RHEL-124938

[0.11.10-1]
- Rebased pcs to the latest sources (see CHANGELOG.md)
  Resolves: RHEL-77194, RHEL-92044
- Updated pcs-web-ui to 0.1.23 (see CHANGELOG_WUI.md)
  Resolves: RHEL-76309, RHEL-99805
- There is now a changelog for the pcsd web UI
  Resolves: RHEL-86233
- Fixed directory permissions for RHEL Image Mode
  Resolves: RHEL-97220
- Updated bundled rubygem rack

[0.11.9-3]
- Rebased pcs to the latest sources (see CHANGELOG.md)
  Resolves: RHEL-35420, RHEL-76055, RHEL-76059, RHEL-76060, RHEL-76153, RHEL-76154, RHEL-76170, RHEL-76177, RHEL-82894
- Rebased pcs-web-ui to the latest sources
  Resolves: RHEL-76310, RHEL-76311, RHEL-76312, RHEL-79317, RHEL-85196, RHEL-85197, RHEL-85745
- The upstream version of pcs-web-ui can now be queried through RPM - see bundled(pcs-web-ui)
  Resolves: RHEL-86229
- Updated bundled rubygems: backports, childprocess, ffi, puma, rack, rack-protection, rack-session, rack-test, sinatra, tilt
  Resolves: RHEL-90151
- Bundled rubygem logger
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>IMPORTANT</severity>
<rights>Copyright 2025 Oracle, Inc.</rights>
<issued date="2025-11-25"/>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2025-59830.html" public="20250925">CVE-2025-59830</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2025-61770.html" public="20251007">CVE-2025-61770</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2025-61771.html" public="20251007">CVE-2025-61771</cve>
<cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://linux.oracle.com/cve/CVE-2025-61772.html" public="20251007">CVE-2025-61772</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2025-61919.html" public="20251010">CVE-2025-61919</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:9::addons</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962001" comment="Oracle Linux 9 is installed"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962002" comment="Oracle Linux arch is aarch64"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962003" comment="pcs is earlier than 0:0.11.10-1.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:202520962004" comment="pcs is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962005" comment="pcs-snmp is earlier than 0:0.11.10-1.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:202520962006" comment="pcs-snmp is signed with the Oracle Linux 9 key"/>
</criteria>
</criteria>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962007" comment="Oracle Linux arch is x86_64"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962003" comment="pcs is earlier than 0:0.11.10-1.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:202520962004" comment="pcs is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202520962005" comment="pcs-snmp is earlier than 0:0.11.10-1.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:202520962006" comment="pcs-snmp is signed with the Oracle Linux 9 key"/>
</criteria>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962001"  version="501" comment="Oracle Linux 9 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962001" />
<state state_ref="oval:com.oracle.elsa:ste:202520962002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962002"  version="501" comment="Oracle Linux arch is aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962001" />
<state state_ref="oval:com.oracle.elsa:ste:202520962003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962003"  version="501" comment="pcs is earlier than 0:0.11.10-1.el9_7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962002" />
<state state_ref="oval:com.oracle.elsa:ste:202520962004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962004"  version="501" comment="pcs is signed with the Oracle Linux 9 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962002" />
<state state_ref="oval:com.oracle.elsa:ste:202520962001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962005"  version="501" comment="pcs-snmp is earlier than 0:0.11.10-1.el9_7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962003" />
<state state_ref="oval:com.oracle.elsa:ste:202520962004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962006"  version="501" comment="pcs-snmp is signed with the Oracle Linux 9 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962003" />
<state state_ref="oval:com.oracle.elsa:ste:202520962001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202520962007"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202520962001" />
<state state_ref="oval:com.oracle.elsa:ste:202520962005" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:202520962002" version="501">
<name>pcs</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:202520962003" version="501">
<name>pcs-snmp</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:202520962001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>

</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202520962001" version="501">
<signature_keyid operation="equals">bc4d06a08d8b756f</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202520962002" version="501">
<version operation="pattern match">^9</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202520962003" version="501">
<arch operation="pattern match">aarch64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202520962004" version="501">
<evr datatype="evr_string" operation="less than">0:0.11.10-1.el9_7.1</evr>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202520962005" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>

</states>
</oval_definitions>
