diff --git a/oval/c10f1/ALT-PU-2021-2943/definitions.json b/oval/c10f1/ALT-PU-2021-2943/definitions.json
index da001fdb74..7fd550be68 100644
--- a/oval/c10f1/ALT-PU-2021-2943/definitions.json
+++ b/oval/c10f1/ALT-PU-2021-2943/definitions.json
@@ -39,6 +39,26 @@
             "RefURL": "https://bdu.fstec.ru/vul/2022-02425",
             "Source": "BDU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2017-8923",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8923",
@@ -53,9 +73,29 @@
             "RefID": "CVE-2021-21706",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21706",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php7 to version 7.4.24-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01814: Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2021-06176: Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы\n\n * BDU:2022-02425: Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * CVE-2017-8923: The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.\n\n * CVE-2017-9120: PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.\n\n * CVE-2021-21706: In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.",
+        "Description": "This update upgrades php7 to version 7.4.24-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01814: Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2021-06176: Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы\n\n * BDU:2022-02425: Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2017-8923: The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.\n\n * CVE-2017-9120: PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.\n\n * CVE-2021-21706: In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
           "Severity": "Critical",
@@ -64,7 +104,7 @@
             "Date": "2021-09-30"
           },
           "Updated": {
-            "Date": "2021-09-30"
+            "Date": "2024-11-14"
           },
           "BDUs": [
             {
@@ -92,6 +132,42 @@
               "Href": "https://bdu.fstec.ru/vul/2022-02425",
               "Impact": "Critical",
               "Public": "20180802"
+            },
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
             }
           ],
           "CVEs": [
@@ -121,6 +197,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21706",
               "Impact": "Low",
               "Public": "20211004"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/c10f1/ALT-PU-2023-4125/definitions.json b/oval/c10f1/ALT-PU-2023-4125/definitions.json
index a42f8e04e6..bcdeb223bf 100644
--- a/oval/c10f1/ALT-PU-2023-4125/definitions.json
+++ b/oval/c10f1/ALT-PU-2023-4125/definitions.json
@@ -24,24 +24,101 @@
             "RefURL": "https://errata.altlinux.org/ALT-PU-2023-4125",
             "Source": "ALTPU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2023-3247",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3247",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php8.0 to version 8.0.29-alt1. \nSecurity Fix(es):\n\n * CVE-2023-3247: In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce. \n\n",
+        "Description": "This update upgrades php8.0 to version 8.0.29-alt1. \nSecurity Fix(es):\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2023-3247: In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce. \n\n\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
-          "Severity": "Low",
+          "Severity": "Critical",
           "Rights": "Copyright 2024 BaseALT Ltd.",
           "Issued": {
             "Date": "2023-06-30"
           },
           "Updated": {
-            "Date": "2023-06-30"
+            "Date": "2024-11-14"
           },
-          "BDUs": null,
+          "BDUs": [
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
+            }
+          ],
           "CVEs": [
             {
               "ID": "CVE-2023-3247",
@@ -50,6 +127,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3247",
               "Impact": "Low",
               "Public": "20230722"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/c10f1/ALT-PU-2023-8445/definitions.json b/oval/c10f1/ALT-PU-2023-8445/definitions.json
new file mode 100644
index 0000000000..8f83ea69ea
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2023-8445/definitions.json
@@ -0,0 +1,170 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:20238445",
+      "Version": "oval:org.altlinux.errata:def:20238445",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2023-8445: package `php8.2` update to version 8.2.3-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch c10f1"
+            ],
+            "Products": [
+              "ALT SP Workstation",
+              "ALT SP Server"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2023-8445",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2023-8445",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "BDU:2023-02263",
+            "RefURL": "https://bdu.fstec.ru/vul/2023-02263",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2023-02264",
+            "RefURL": "https://bdu.fstec.ru/vul/2023-02264",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07326",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07326",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "CVE-2023-0567",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0567",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2023-0568",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0568",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2023-0662",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0662",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades php8.2 to version 8.2.3-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02263: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02264: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2024-07326: Уязвимость функции верификации пароля языка программирования PHP, связанная с недостаточным вычислением хеша пароля, позволяющая нарушителю оказать воздействие на целостность данных\n\n * CVE-2023-0567: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. \n\n\n\n * CVE-2023-0568: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. \n\n * CVE-2023-0662: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. ",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "High",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-14"
+          },
+          "Updated": {
+            "Date": "2024-11-14"
+          },
+          "BDUs": [
+            {
+              "ID": "BDU:2023-02263",
+              "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-400",
+              "Href": "https://bdu.fstec.ru/vul/2023-02263",
+              "Impact": "High",
+              "Public": "20230216"
+            },
+            {
+              "ID": "BDU:2023-02264",
+              "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-131, CWE-770",
+              "Href": "https://bdu.fstec.ru/vul/2023-02264",
+              "Impact": "High",
+              "Public": "20230216"
+            },
+            {
+              "ID": "BDU:2024-07326",
+              "CVSS": "AV:L/AC:L/Au:N/C:N/I:C/A:N",
+              "CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+              "CWE": "CWE-916",
+              "Href": "https://bdu.fstec.ru/vul/2024-07326",
+              "Impact": "Low",
+              "Public": "20230105"
+            }
+          ],
+          "CVEs": [
+            {
+              "ID": "CVE-2023-0567",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+              "CWE": "CWE-916",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0567",
+              "Impact": "Low",
+              "Public": "20230301"
+            },
+            {
+              "ID": "CVE-2023-0568",
+              "CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-770",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0568",
+              "Impact": "High",
+              "Public": "20230216"
+            },
+            {
+              "ID": "CVE-2023-0662",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-400",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0662",
+              "Impact": "High",
+              "Public": "20230216"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:spworkstation:10",
+              "cpe:/o:alt:spserver:10"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:4001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445001",
+                "Comment": "php8.2 is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445002",
+                "Comment": "php8.2-devel is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445003",
+                "Comment": "php8.2-libs is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445004",
+                "Comment": "php8.2-mysqlnd is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445005",
+                "Comment": "rpm-build-php8.2-version is earlier than 0:8.2.3-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2023-8445/objects.json b/oval/c10f1/ALT-PU-2023-8445/objects.json
new file mode 100644
index 0000000000..cbdf3b1871
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2023-8445/objects.json
@@ -0,0 +1,58 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:4001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445001",
+      "Version": "1",
+      "Comment": "php8.2 is installed",
+      "Name": "php8.2"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445002",
+      "Version": "1",
+      "Comment": "php8.2-devel is installed",
+      "Name": "php8.2-devel"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445003",
+      "Version": "1",
+      "Comment": "php8.2-libs is installed",
+      "Name": "php8.2-libs"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445004",
+      "Version": "1",
+      "Comment": "php8.2-mysqlnd is installed",
+      "Name": "php8.2-mysqlnd"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445005",
+      "Version": "1",
+      "Comment": "rpm-build-php8.2-version is installed",
+      "Name": "rpm-build-php8.2-version"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2023-8445/states.json b/oval/c10f1/ALT-PU-2023-8445/states.json
new file mode 100644
index 0000000000..83d5b1102e
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2023-8445/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:4001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:20238445001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:8.2.3-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:8.2.3-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2023-8445/tests.json b/oval/c10f1/ALT-PU-2023-8445/tests.json
new file mode 100644
index 0000000000..1e395586af
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2023-8445/tests.json
@@ -0,0 +1,78 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:4001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'c10f1' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:4001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:4001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2 is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2-devel is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445003",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2-libs is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445003"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445004",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2-mysqlnd is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445004"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445005",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "rpm-build-php8.2-version is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445005"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15469/definitions.json b/oval/c10f1/ALT-PU-2024-15469/definitions.json
new file mode 100644
index 0000000000..87e7efda85
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15469/definitions.json
@@ -0,0 +1,89 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415469",
+      "Version": "oval:org.altlinux.errata:def:202415469",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15469: package `log4cxx` update to version 1.1.0-alt1_3",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch c10f1"
+            ],
+            "Products": [
+              "ALT SP Workstation",
+              "ALT SP Server"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15469",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15469",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "CVE-2023-31038",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-31038",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades log4cxx to version 1.1.0-alt1_3. \nSecurity Fix(es):\n\n * CVE-2023-31038: SQL injection in Log4cxx when using the ODBC appender to send log messages to a database.  No fields sent to the database were properly escaped for SQL injection.  This has been the case since at least version 0.9.0(released 2003-08-06)\n\n\n\n\nNote that Log4cxx is a C++ framework, so only C++ applications are affected.\n\nBefore version 1.1.0, the ODBC appender was automatically part of Log4cxx if the library was found when compiling the library.  As of version 1.1.0, this must be both explicitly enabled in order to be compiled in.\n\n\n\n\nThree preconditions must be met for this vulnerability to be possible:\n\n1. Log4cxx compiled with ODBC support(before version 1.1.0, this was auto-detected at compile time)\n\n2. ODBCAppender enabled for logging messages to, generally done via a config file\n\n3. User input is logged at some point. If your application does not have user input, it is unlikely to be affected.\n\n\n\n\n\nUsers are recommended to upgrade to version 1.1.0 which properly binds the parameters to the SQL statement, or migrate to the new DBAppender class which supports an ODBC connection in addition to other databases. \nNote that this fix does require a configuration file update, as the old configuration files will not configure properly.  An example is shown below, and more information may be found in the Log4cxx documentation on the ODBCAppender.\n\n\n\n\n\nExample of old configuration snippet:\n\n\u003cappender name=\"SqlODBCAppender\" class=\"ODBCAppender\"\u003e\n\n    \u003cparam name=\"sql\" value=\"INSERT INTO logs (message) VALUES ('%m')\" /\u003e\n\n    ... other params here ...\n\n\u003c/appender\u003e\n\n\n\n\nThe migrated configuration snippet with new ColumnMapping parameters:\n\n\n\u003cappender name=\"SqlODBCAppender\" class=\"ODBCAppender\"\u003e\n\n\n\n\n    \u003cparam name=\"sql\" value=\"INSERT INTO logs (message) VALUES (?)\" /\u003e\n\n    \u003cparam name=\"ColumnMapping\" value=\"message\"/\u003e\n    ... other params here ...\n\n\n\u003c/appender\u003e\n\n\n\n\n\n",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "High",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2023-31038",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-89",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-31038",
+              "Impact": "High",
+              "Public": "20230508"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:spworkstation:10",
+              "cpe:/o:alt:spserver:10"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:4001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415469001",
+                "Comment": "log4cxx is earlier than 0:1.1.0-alt1_3"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415469002",
+                "Comment": "log4cxx-devel is earlier than 0:1.1.0-alt1_3"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15469/objects.json b/oval/c10f1/ALT-PU-2024-15469/objects.json
new file mode 100644
index 0000000000..d45514f311
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15469/objects.json
@@ -0,0 +1,40 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:4001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415469001",
+      "Version": "1",
+      "Comment": "log4cxx is installed",
+      "Name": "log4cxx"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415469002",
+      "Version": "1",
+      "Comment": "log4cxx-devel is installed",
+      "Name": "log4cxx-devel"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15469/states.json b/oval/c10f1/ALT-PU-2024-15469/states.json
new file mode 100644
index 0000000000..df9e518935
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15469/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:4001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415469001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:1.1.0-alt1_3",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:1.1.0-alt1_3",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15469/tests.json b/oval/c10f1/ALT-PU-2024-15469/tests.json
new file mode 100644
index 0000000000..7cfbf07545
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15469/tests.json
@@ -0,0 +1,42 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:4001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'c10f1' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:4001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:4001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415469001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "log4cxx is earlier than 0:1.1.0-alt1_3",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415469001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415469001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415469002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "log4cxx-devel is earlier than 0:1.1.0-alt1_3",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415469002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415469001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15496/definitions.json b/oval/c10f1/ALT-PU-2024-15496/definitions.json
new file mode 100644
index 0000000000..17f5070af2
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15496/definitions.json
@@ -0,0 +1,95 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415496",
+      "Version": "oval:org.altlinux.errata:def:202415496",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15496: package `unbound` update to version 1.20.1-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch c10f1"
+            ],
+            "Products": [
+              "ALT SP Workstation",
+              "ALT SP Server"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15496",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15496",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "CVE-2024-8508",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8508",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades unbound to version 1.20.1-alt1. \nSecurity Fix(es):\n\n * CVE-2024-8508: NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "Low",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2024-8508",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8508",
+              "Impact": "None",
+              "Public": "20241003"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:spworkstation:10",
+              "cpe:/o:alt:spserver:10"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:4001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415496001",
+                "Comment": "libunbound is earlier than 0:1.20.1-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415496002",
+                "Comment": "libunbound-devel is earlier than 0:1.20.1-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415496003",
+                "Comment": "unbound is earlier than 0:1.20.1-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415496004",
+                "Comment": "unbound-control is earlier than 0:1.20.1-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15496/objects.json b/oval/c10f1/ALT-PU-2024-15496/objects.json
new file mode 100644
index 0000000000..30af0f0646
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15496/objects.json
@@ -0,0 +1,52 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:4001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415496001",
+      "Version": "1",
+      "Comment": "libunbound is installed",
+      "Name": "libunbound"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415496002",
+      "Version": "1",
+      "Comment": "libunbound-devel is installed",
+      "Name": "libunbound-devel"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415496003",
+      "Version": "1",
+      "Comment": "unbound is installed",
+      "Name": "unbound"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415496004",
+      "Version": "1",
+      "Comment": "unbound-control is installed",
+      "Name": "unbound-control"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15496/states.json b/oval/c10f1/ALT-PU-2024-15496/states.json
new file mode 100644
index 0000000000..236e280cd3
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15496/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:4001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415496001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:1.20.1-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:1.20.1-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-15496/tests.json b/oval/c10f1/ALT-PU-2024-15496/tests.json
new file mode 100644
index 0000000000..7bbf862469
--- /dev/null
+++ b/oval/c10f1/ALT-PU-2024-15496/tests.json
@@ -0,0 +1,66 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:4001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'c10f1' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:4001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:4001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415496001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "libunbound is earlier than 0:1.20.1-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415496001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415496001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415496002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "libunbound-devel is earlier than 0:1.20.1-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415496002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415496001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415496003",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "unbound is earlier than 0:1.20.1-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415496003"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415496001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415496004",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "unbound-control is earlier than 0:1.20.1-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415496004"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415496001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/c10f1/ALT-PU-2024-6670/definitions.json b/oval/c10f1/ALT-PU-2024-6670/definitions.json
index fce5f5111a..b7a9334f33 100644
--- a/oval/c10f1/ALT-PU-2024-6670/definitions.json
+++ b/oval/c10f1/ALT-PU-2024-6670/definitions.json
@@ -24,6 +24,26 @@
             "RefURL": "https://errata.altlinux.org/ALT-PU-2024-6670",
             "Source": "ALTPU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2024-1874",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1874",
@@ -38,20 +58,77 @@
             "RefID": "CVE-2024-3096",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3096",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php8.1 to version 8.1.28-alt1. \nSecurity Fix(es):\n\n * CVE-2024-1874: In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. \n\n\n\n * CVE-2024-2756: Due to an incomplete fix to  CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications. \n\n\n * CVE-2024-3096: In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.\n\n",
+        "Description": "This update upgrades php8.1 to version 8.1.28-alt1. \nSecurity Fix(es):\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2024-1874: In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell. \n\n\n\n * CVE-2024-2756: Due to an incomplete fix to  CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications. \n\n\n * CVE-2024-3096: In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.\n\n\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
-          "Severity": "Low",
+          "Severity": "Critical",
           "Rights": "Copyright 2024 BaseALT Ltd.",
           "Issued": {
             "Date": "2024-04-16"
           },
           "Updated": {
-            "Date": "2024-04-16"
+            "Date": "2024-11-14"
           },
-          "BDUs": null,
+          "BDUs": [
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
+            }
+          ],
           "CVEs": [
             {
               "ID": "CVE-2024-1874",
@@ -70,6 +147,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3096",
               "Impact": "None",
               "Public": "20240429"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/c9f2/ALT-PU-2019-1959/definitions.json b/oval/c9f2/ALT-PU-2019-1959/definitions.json
index 1268f78b59..2671f4acc5 100644
--- a/oval/c9f2/ALT-PU-2019-1959/definitions.json
+++ b/oval/c9f2/ALT-PU-2019-1959/definitions.json
@@ -39,6 +39,26 @@
             "RefURL": "https://bdu.fstec.ru/vul/2020-01676",
             "Source": "BDU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2019-11038",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11038",
@@ -53,9 +73,29 @@
             "RefID": "CVE-2019-11040",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11040",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php7 to version 7.2.19-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01416: Уязвимость функции exif_iif_add_value интерпретатора языка программирования PHP, связанная с чтением данных за допустимыми границами, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01419: Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01676: Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * CVE-2019-11038: When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.\n\n * CVE-2019-11039: Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.\n\n * CVE-2019-11040: When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.",
+        "Description": "This update upgrades php7 to version 7.2.19-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01416: Уязвимость функции exif_iif_add_value интерпретатора языка программирования PHP, связанная с чтением данных за допустимыми границами, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01419: Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01676: Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2019-11038: When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.\n\n * CVE-2019-11039: Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.\n\n * CVE-2019-11040: When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
           "Severity": "Critical",
@@ -64,7 +104,7 @@
             "Date": "2019-06-02"
           },
           "Updated": {
-            "Date": "2019-06-02"
+            "Date": "2024-11-14"
           },
           "BDUs": [
             {
@@ -93,6 +133,42 @@
               "Href": "https://bdu.fstec.ru/vul/2020-01676",
               "Impact": "High",
               "Public": "20190505"
+            },
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
             }
           ],
           "CVEs": [
@@ -122,6 +198,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11040",
               "Impact": "Critical",
               "Public": "20190619"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/c9f2/ALT-PU-2021-3079/definitions.json b/oval/c9f2/ALT-PU-2021-3079/definitions.json
index d156428f5c..0dcbe260ee 100644
--- a/oval/c9f2/ALT-PU-2021-3079/definitions.json
+++ b/oval/c9f2/ALT-PU-2021-3079/definitions.json
@@ -59,6 +59,26 @@
             "RefURL": "https://bdu.fstec.ru/vul/2021-06176",
             "Source": "BDU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2020-7069",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-7069",
@@ -93,18 +113,38 @@
             "RefID": "CVE-2021-21706",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21706",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php7 to version 7.3.31-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01912: Уязвимость функции openssl_encrypt() языка программирования php, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2021-01913: Уязвимость механизма обработки файлов cookie языка программирования php, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01914: Уязвимость функции URL языка программирования php, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-03159: Уязвимость расширения SOAP интерпретатора PHP, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2021-03559: Уязвимость модуля pdo_firebase интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03703: Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку\n\n * BDU:2021-06176: Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы\n\n * CVE-2020-7069: In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.\n\n * CVE-2020-7070: In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.\n\n * CVE-2020-7071: In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.\n\n * CVE-2021-21702: In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.\n\n * CVE-2021-21704: In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.\n\n * CVE-2021-21705: In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.\n\n * CVE-2021-21706: In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.",
+        "Description": "This update upgrades php7 to version 7.3.31-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01912: Уязвимость функции openssl_encrypt() языка программирования php, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2021-01913: Уязвимость механизма обработки файлов cookie языка программирования php, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01914: Уязвимость функции URL языка программирования php, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-03159: Уязвимость расширения SOAP интерпретатора PHP, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2021-03559: Уязвимость модуля pdo_firebase интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03703: Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку\n\n * BDU:2021-06176: Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2020-7069: In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.\n\n * CVE-2020-7070: In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.\n\n * CVE-2020-7071: In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.\n\n * CVE-2021-21702: In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.\n\n * CVE-2021-21704: In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.\n\n * CVE-2021-21705: In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.\n\n * CVE-2021-21706: In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
-          "Severity": "High",
+          "Severity": "Critical",
           "Rights": "Copyright 2024 BaseALT Ltd.",
           "Issued": {
             "Date": "2021-10-21"
           },
           "Updated": {
-            "Date": "2021-10-21"
+            "Date": "2024-11-14"
           },
           "BDUs": [
             {
@@ -169,6 +209,42 @@
               "Href": "https://bdu.fstec.ru/vul/2021-06176",
               "Impact": "Low",
               "Public": "20210906"
+            },
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
             }
           ],
           "CVEs": [
@@ -234,6 +310,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21706",
               "Impact": "Low",
               "Public": "20211004"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/c9f2/ALT-PU-2023-1275/definitions.json b/oval/c9f2/ALT-PU-2023-1275/definitions.json
index 7ec258df26..41c0a18035 100644
--- a/oval/c9f2/ALT-PU-2023-1275/definitions.json
+++ b/oval/c9f2/ALT-PU-2023-1275/definitions.json
@@ -34,6 +34,26 @@
             "RefURL": "https://bdu.fstec.ru/vul/2023-02264",
             "Source": "BDU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2023-0567",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0567",
@@ -48,18 +68,38 @@
             "RefID": "CVE-2023-0662",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0662",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php8.1 to version 8.1.16-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02263: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02264: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * CVE-2023-0567: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. \n\n\n\n * CVE-2023-0568: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. \n\n * CVE-2023-0662: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. ",
+        "Description": "This update upgrades php8.1 to version 8.1.16-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02263: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02264: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2023-0567: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. \n\n\n\n * CVE-2023-0568: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. \n\n * CVE-2023-0662: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. \n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
-          "Severity": "High",
+          "Severity": "Critical",
           "Rights": "Copyright 2024 BaseALT Ltd.",
           "Issued": {
             "Date": "2023-02-17"
           },
           "Updated": {
-            "Date": "2023-02-17"
+            "Date": "2024-11-14"
           },
           "BDUs": [
             {
@@ -79,6 +119,42 @@
               "Href": "https://bdu.fstec.ru/vul/2023-02264",
               "Impact": "High",
               "Public": "20230216"
+            },
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
             }
           ],
           "CVEs": [
@@ -105,6 +181,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0662",
               "Impact": "High",
               "Public": "20230216"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/c9f2/ALT-PU-2023-6995/definitions.json b/oval/c9f2/ALT-PU-2023-6995/definitions.json
index db2f8240e5..9b2bdcc8fc 100644
--- a/oval/c9f2/ALT-PU-2023-6995/definitions.json
+++ b/oval/c9f2/ALT-PU-2023-6995/definitions.json
@@ -30,7 +30,7 @@
             "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades salt to version 3005.4-alt0.c9.1. \nSecurity Fix(es):\n\n * CVE-2023-34049: description unavailable",
+        "Description": "This update upgrades salt to version 3005.4-alt0.c9.1. \nSecurity Fix(es):\n\n * CVE-2023-34049: The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.",
         "Advisory": {
           "From": "errata.altlinux.org",
           "Severity": "Low",
@@ -42,6 +42,14 @@
             "Date": "2023-12-04"
           },
           "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2023-34049",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34049",
+              "Impact": "None",
+              "Public": "20241114"
+            }
+          ],
           "AffectedCPEs": {
             "CPEs": [
               "cpe:/o:alt:spworkstation:8.4",
diff --git a/oval/p10/ALT-PU-2021-2943/definitions.json b/oval/p10/ALT-PU-2021-2943/definitions.json
index 19a7d70172..7a8c949743 100644
--- a/oval/p10/ALT-PU-2021-2943/definitions.json
+++ b/oval/p10/ALT-PU-2021-2943/definitions.json
@@ -44,6 +44,26 @@
             "RefURL": "https://bdu.fstec.ru/vul/2022-02425",
             "Source": "BDU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2017-8923",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8923",
@@ -58,9 +78,29 @@
             "RefID": "CVE-2021-21706",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21706",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php7 to version 7.4.24-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01814: Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2021-06176: Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы\n\n * BDU:2022-02425: Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * CVE-2017-8923: The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.\n\n * CVE-2017-9120: PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.\n\n * CVE-2021-21706: In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.",
+        "Description": "This update upgrades php7 to version 7.4.24-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01814: Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2021-06176: Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы\n\n * BDU:2022-02425: Уязвимость функции mysqli_real_escape_string интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2017-8923: The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.\n\n * CVE-2017-9120: PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.\n\n * CVE-2021-21706: In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
           "Severity": "Critical",
@@ -69,7 +109,7 @@
             "Date": "2021-09-30"
           },
           "Updated": {
-            "Date": "2021-09-30"
+            "Date": "2024-11-14"
           },
           "BDUs": [
             {
@@ -97,6 +137,42 @@
               "Href": "https://bdu.fstec.ru/vul/2022-02425",
               "Impact": "Critical",
               "Public": "20180802"
+            },
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
             }
           ],
           "CVEs": [
@@ -126,6 +202,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21706",
               "Impact": "Low",
               "Public": "20211004"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/p10/ALT-PU-2023-8079/definitions.json b/oval/p10/ALT-PU-2023-8079/definitions.json
index a989606eda..ee4c9e8dfb 100644
--- a/oval/p10/ALT-PU-2023-8079/definitions.json
+++ b/oval/p10/ALT-PU-2023-8079/definitions.json
@@ -35,7 +35,7 @@
             "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades salt to version 3006.4-alt0.p10.1. \nSecurity Fix(es):\n\n * CVE-2023-34049: description unavailable",
+        "Description": "This update upgrades salt to version 3006.4-alt0.p10.1. \nSecurity Fix(es):\n\n * CVE-2023-34049: The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.",
         "Advisory": {
           "From": "errata.altlinux.org",
           "Severity": "Low",
@@ -47,6 +47,14 @@
             "Date": "2024-01-29"
           },
           "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2023-34049",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34049",
+              "Impact": "None",
+              "Public": "20241114"
+            }
+          ],
           "AffectedCPEs": {
             "CPEs": [
               "cpe:/o:alt:kworkstation:10",
diff --git a/oval/p10/ALT-PU-2023-8445/definitions.json b/oval/p10/ALT-PU-2023-8445/definitions.json
new file mode 100644
index 0000000000..8ee1934349
--- /dev/null
+++ b/oval/p10/ALT-PU-2023-8445/definitions.json
@@ -0,0 +1,194 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:20238445",
+      "Version": "oval:org.altlinux.errata:def:20238445",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2023-8445: package `php8.2` update to version 8.2.3-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2023-8445",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2023-8445",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "BDU:2023-02263",
+            "RefURL": "https://bdu.fstec.ru/vul/2023-02263",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2023-02264",
+            "RefURL": "https://bdu.fstec.ru/vul/2023-02264",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07326",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07326",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "CVE-2023-0567",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0567",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2023-0568",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0568",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2023-0662",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0662",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades php8.2 to version 8.2.3-alt1. \nSecurity Fix(es):\n\n * BDU:2023-02263: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02264: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2024-07326: Уязвимость функции верификации пароля языка программирования PHP, связанная с недостаточным вычислением хеша пароля, позволяющая нарушителю оказать воздействие на целостность данных\n\n * CVE-2023-0567: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. \n\n\n\n * CVE-2023-0568: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. \n\n * CVE-2023-0662: In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. ",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "High",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-14"
+          },
+          "Updated": {
+            "Date": "2024-11-14"
+          },
+          "BDUs": [
+            {
+              "ID": "BDU:2023-02263",
+              "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-400",
+              "Href": "https://bdu.fstec.ru/vul/2023-02263",
+              "Impact": "High",
+              "Public": "20230216"
+            },
+            {
+              "ID": "BDU:2023-02264",
+              "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-131, CWE-770",
+              "Href": "https://bdu.fstec.ru/vul/2023-02264",
+              "Impact": "High",
+              "Public": "20230216"
+            },
+            {
+              "ID": "BDU:2024-07326",
+              "CVSS": "AV:L/AC:L/Au:N/C:N/I:C/A:N",
+              "CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+              "CWE": "CWE-916",
+              "Href": "https://bdu.fstec.ru/vul/2024-07326",
+              "Impact": "Low",
+              "Public": "20230105"
+            }
+          ],
+          "CVEs": [
+            {
+              "ID": "CVE-2023-0567",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+              "CWE": "CWE-916",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0567",
+              "Impact": "Low",
+              "Public": "20230301"
+            },
+            {
+              "ID": "CVE-2023-0568",
+              "CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-770",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0568",
+              "Impact": "High",
+              "Public": "20230216"
+            },
+            {
+              "ID": "CVE-2023-0662",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-400",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0662",
+              "Impact": "High",
+              "Public": "20230216"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445001",
+                "Comment": "php8.2 is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445002",
+                "Comment": "php8.2-devel is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445003",
+                "Comment": "php8.2-libs is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445004",
+                "Comment": "php8.2-mysqlnd is earlier than 0:8.2.3-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:20238445005",
+                "Comment": "rpm-build-php8.2-version is earlier than 0:8.2.3-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2023-8445/objects.json b/oval/p10/ALT-PU-2023-8445/objects.json
new file mode 100644
index 0000000000..abcedea0ef
--- /dev/null
+++ b/oval/p10/ALT-PU-2023-8445/objects.json
@@ -0,0 +1,58 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445001",
+      "Version": "1",
+      "Comment": "php8.2 is installed",
+      "Name": "php8.2"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445002",
+      "Version": "1",
+      "Comment": "php8.2-devel is installed",
+      "Name": "php8.2-devel"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445003",
+      "Version": "1",
+      "Comment": "php8.2-libs is installed",
+      "Name": "php8.2-libs"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445004",
+      "Version": "1",
+      "Comment": "php8.2-mysqlnd is installed",
+      "Name": "php8.2-mysqlnd"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:20238445005",
+      "Version": "1",
+      "Comment": "rpm-build-php8.2-version is installed",
+      "Name": "rpm-build-php8.2-version"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2023-8445/states.json b/oval/p10/ALT-PU-2023-8445/states.json
new file mode 100644
index 0000000000..cb4047ff75
--- /dev/null
+++ b/oval/p10/ALT-PU-2023-8445/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:20238445001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:8.2.3-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:8.2.3-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2023-8445/tests.json b/oval/p10/ALT-PU-2023-8445/tests.json
new file mode 100644
index 0000000000..1265474fa1
--- /dev/null
+++ b/oval/p10/ALT-PU-2023-8445/tests.json
@@ -0,0 +1,78 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2 is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2-devel is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445003",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2-libs is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445003"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445004",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "php8.2-mysqlnd is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445004"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:20238445005",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "rpm-build-php8.2-version is earlier than 0:8.2.3-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:20238445005"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:20238445001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14505/definitions.json b/oval/p10/ALT-PU-2024-14505/definitions.json
new file mode 100644
index 0000000000..50bef80344
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14505/definitions.json
@@ -0,0 +1,192 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202414505",
+      "Version": "oval:org.altlinux.errata:def:202414505",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-14505: package `kernel-image-std-def` update to version 5.10.228-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-14505",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-14505",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "CVE-2024-50074",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50074",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-50082",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50082",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-50083",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50083",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-50099",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50099",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades kernel-image-std-def to version 5.10.228-alt1. \nSecurity Fix(es):\n\n * CVE-2024-50074: In the Linux kernel, the following vulnerability has been resolved:\n\nparport: Proper fix for array out-of-bounds access\n\nThe recent fix for array out-of-bounds accesses replaced sprintf()\ncalls blindly with snprintf().  However, since snprintf() returns the\nwould-be-printed size, not the actually output size, the length\ncalculation can still go over the given limit.\n\nUse scnprintf() instead of snprintf(), which returns the actually\noutput letters, for addressing the potential out-of-bounds access\nproperly.\n\n * CVE-2024-50082: In the Linux kernel, the following vulnerability has been resolved:\n\nblk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race\n\nWe're seeing crashes from rq_qos_wake_function that look like this:\n\n  BUG: unable to handle page fault for address: ffffafe180a40084\n  #PF: supervisor write access in kernel mode\n  #PF: error_code(0x0002) - not-present page\n  PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0\n  Oops: Oops: 0002 [#1] PREEMPT SMP PTI\n  CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n  RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40\n  Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 \u003cf0\u003e 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00\n  RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046\n  RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011\n  RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084\n  RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011\n  R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002\n  R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003\n  FS:  0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  PKRU: 55555554\n  Call Trace:\n   \u003cIRQ\u003e\n   try_to_wake_up+0x5a/0x6a0\n   rq_qos_wake_function+0x71/0x80\n   __wake_up_common+0x75/0xa0\n   __wake_up+0x36/0x60\n   scale_up.part.0+0x50/0x110\n   wb_timer_fn+0x227/0x450\n   ...\n\nSo rq_qos_wake_function() calls wake_up_process(data-\u003etask), which calls\ntry_to_wake_up(), which faults in raw_spin_lock_irqsave(\u0026p-\u003epi_lock).\n\np comes from data-\u003etask, and data comes from the waitqueue entry, which\nis stored on the waiter's stack in rq_qos_wait(). Analyzing the core\ndump with drgn, I found that the waiter had already woken up and moved\non to a completely unrelated code path, clobbering what was previously\ndata-\u003etask. Meanwhile, the waker was passing the clobbered garbage in\ndata-\u003etask to wake_up_process(), leading to the crash.\n\nWhat's happening is that in between rq_qos_wake_function() deleting the\nwaitqueue entry and calling wake_up_process(), rq_qos_wait() is finding\nthat it already got a token and returning. The race looks like this:\n\nrq_qos_wait()                           rq_qos_wake_function()\n==============================================================\nprepare_to_wait_exclusive()\n                                        data-\u003egot_token = true;\n                                        list_del_init(\u0026curr-\u003eentry);\nif (data.got_token)\n        break;\nfinish_wait(\u0026rqw-\u003ewait, \u0026data.wq);\n  ^- returns immediately because\n     list_empty_careful(\u0026wq_entry-\u003eentry)\n     is true\n... return, go do something else ...\n                                        wake_up_process(data-\u003etask)\n                                          (NO LONGER VALID!)-^\n\nNormally, finish_wait() is supposed to synchronize against the waker.\nBut, as noted above, it is returning immediately because the waitqueue\nentry has already been removed from the waitqueue.\n\nThe bug is that rq_qos_wake_function() is accessing the waitqueue entry\nAFTER deleting it. Note that autoremove_wake_function() wakes the waiter\nand THEN deletes the waitqueue entry, which is the proper order.\n\nFix it by swapping the order. We also need to use\nlist_del_init_careful() to match the list_empty_careful() in\nfinish_wait().\n\n * CVE-2024-50083: In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix mptcp DSS corruption due to large pmtu xmit\n\nSyzkaller was able to trigger a DSS corruption:\n\n  TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.\n  ------------[ cut here ]------------\n  WARNING: CPU: 0 PID: 5227 at net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695\n  Modules linked in:\n  CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\n  RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695\n  Code: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 \u003c0f\u003e 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff\n  RSP: 0018:ffffc90000006db8 EFLAGS: 00010246\n  RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00\n  RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 00000000000055f0\n  RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8\n  R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 0000000000000000\n  R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5\n  FS:  000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   \u003cIRQ\u003e\n   move_skbs_to_msk net/mptcp/protocol.c:811 [inline]\n   mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854\n   subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490\n   tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283\n   tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237\n   tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915\n   tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2350\n   ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205\n   ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233\n   NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314\n   NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314\n   __netif_receive_skb_one_core net/core/dev.c:5662 [inline]\n   __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775\n   process_backlog+0x662/0x15b0 net/core/dev.c:6107\n   __napi_poll+0xcb/0x490 net/core/dev.c:6771\n   napi_poll net/core/dev.c:6840 [inline]\n   net_rx_action+0x89b/0x1240 net/core/dev.c:6962\n   handle_softirqs+0x2c5/0x980 kernel/softirq.c:554\n   do_softirq+0x11b/0x1e0 kernel/softirq.c:455\n   \u003c/IRQ\u003e\n   \u003cTASK\u003e\n   __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382\n   local_bh_enable include/linux/bottom_half.h:33 [inline]\n   rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]\n   __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451\n   dev_queue_xmit include/linux/netdevice.h:3094 [inline]\n   neigh_hh_output include/net/neighbour.h:526 [inline]\n   neigh_output include/net/neighbour.h:540 [inline]\n   ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236\n   ip_local_out net/ipv4/ip_output.c:130 [inline]\n   __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536\n   __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466\n   tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]\n   tcp_mtu_probe net/ipv4/tcp_output.c:2547 [inline]\n   tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752\n   __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015\n   tcp_push_pending_frames include/net/tcp.h:2107 [inline]\n   tcp_data_snd_check net/ipv4/tcp_input.c:5714 [inline]\n   tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239\n   tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915\n   sk_backlog_rcv include/net/sock.h:1113 [inline]\n   __release_sock+0x214/0x350 net/core/sock.c:3072\n   release_sock+0x61/0x1f0 net/core/sock.c:3626\n   mptcp_push_\n---truncated---\n\n * CVE-2024-50099: In the Linux kernel, the following vulnerability has been resolved:\n\narm64: probes: Remove broken LDR (literal) uprobe support\n\nThe simulate_ldr_literal() and simulate_ldrsw_literal() functions are\nunsafe to use for uprobes. Both functions were originally written for\nuse with kprobes, and access memory with plain C accesses. When uprobes\nwas added, these were reused unmodified even though they cannot safely\naccess user memory.\n\nThere are three key problems:\n\n1) The plain C accesses do not have corresponding extable entries, and\n   thus if they encounter a fault the kernel will treat these as\n   unintentional accesses to user memory, resulting in a BUG() which\n   will kill the kernel thread, and likely lead to further issues (e.g.\n   lockup or panic()).\n\n2) The plain C accesses are subject to HW PAN and SW PAN, and so when\n   either is in use, any attempt to simulate an access to user memory\n   will fault. Thus neither simulate_ldr_literal() nor\n   simulate_ldrsw_literal() can do anything useful when simulating a\n   user instruction on any system with HW PAN or SW PAN.\n\n3) The plain C accesses are privileged, as they run in kernel context,\n   and in practice can access a small range of kernel virtual addresses.\n   The instructions they simulate have a range of +/-1MiB, and since the\n   simulated instructions must itself be a user instructions in the\n   TTBR0 address range, these can address the final 1MiB of the TTBR1\n   acddress range by wrapping downwards from an address in the first\n   1MiB of the TTBR0 address range.\n\n   In contemporary kernels the last 8MiB of TTBR1 address range is\n   reserved, and accesses to this will always fault, meaning this is no\n   worse than (1).\n\n   Historically, it was theoretically possible for the linear map or\n   vmemmap to spill into the final 8MiB of the TTBR1 address range, but\n   in practice this is extremely unlikely to occur as this would\n   require either:\n\n   * Having enough physical memory to fill the entire linear map all the\n     way to the final 1MiB of the TTBR1 address range.\n\n   * Getting unlucky with KASLR randomization of the linear map such\n     that the populated region happens to overlap with the last 1MiB of\n     the TTBR address range.\n\n   ... and in either case if we were to spill into the final page there\n   would be larger problems as the final page would alias with error\n   pointers.\n\nPractically speaking, (1) and (2) are the big issues. Given there have\nbeen no reports of problems since the broken code was introduced, it\nappears that no-one is relying on probing these instructions with\nuprobes.\n\nAvoid these issues by not allowing uprobes on LDR (literal) and LDRSW\n(literal), limiting the use of simulate_ldr_literal() and\nsimulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR\n(literal) and LDRSW (literal) will be rejected as\narm_probe_decode_insn() will return INSN_REJECTED. In future we can\nconsider introducing working uprobes support for these instructions, but\nthis will require more significant work.",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "High",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2024-50074",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-125",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50074",
+              "Impact": "High",
+              "Public": "20241029"
+            },
+            {
+              "ID": "CVE-2024-50082",
+              "CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50082",
+              "Impact": "Low",
+              "Public": "20241029"
+            },
+            {
+              "ID": "CVE-2024-50083",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50083",
+              "Impact": "High",
+              "Public": "20241029"
+            },
+            {
+              "ID": "CVE-2024-50099",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50099",
+              "Impact": "Low",
+              "Public": "20241105"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505001",
+                "Comment": "kernel-doc-std is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505002",
+                "Comment": "kernel-headers-modules-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505003",
+                "Comment": "kernel-headers-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505004",
+                "Comment": "kernel-image-domU-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505005",
+                "Comment": "kernel-image-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505006",
+                "Comment": "kernel-image-std-def-checkinstall is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505007",
+                "Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505008",
+                "Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505009",
+                "Comment": "kernel-modules-drm-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505010",
+                "Comment": "kernel-modules-ide-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505011",
+                "Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.10.228-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414505012",
+                "Comment": "kernel-modules-staging-std-def is earlier than 2:5.10.228-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14505/objects.json b/oval/p10/ALT-PU-2024-14505/objects.json
new file mode 100644
index 0000000000..ecadf70f0b
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14505/objects.json
@@ -0,0 +1,100 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505001",
+      "Version": "1",
+      "Comment": "kernel-doc-std is installed",
+      "Name": "kernel-doc-std"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505002",
+      "Version": "1",
+      "Comment": "kernel-headers-modules-std-def is installed",
+      "Name": "kernel-headers-modules-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505003",
+      "Version": "1",
+      "Comment": "kernel-headers-std-def is installed",
+      "Name": "kernel-headers-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505004",
+      "Version": "1",
+      "Comment": "kernel-image-domU-std-def is installed",
+      "Name": "kernel-image-domU-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505005",
+      "Version": "1",
+      "Comment": "kernel-image-std-def is installed",
+      "Name": "kernel-image-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505006",
+      "Version": "1",
+      "Comment": "kernel-image-std-def-checkinstall is installed",
+      "Name": "kernel-image-std-def-checkinstall"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505007",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-ancient-std-def is installed",
+      "Name": "kernel-modules-drm-ancient-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505008",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-nouveau-std-def is installed",
+      "Name": "kernel-modules-drm-nouveau-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505009",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-std-def is installed",
+      "Name": "kernel-modules-drm-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505010",
+      "Version": "1",
+      "Comment": "kernel-modules-ide-std-def is installed",
+      "Name": "kernel-modules-ide-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505011",
+      "Version": "1",
+      "Comment": "kernel-modules-midgard-be-m1000-std-def is installed",
+      "Name": "kernel-modules-midgard-be-m1000-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414505012",
+      "Version": "1",
+      "Comment": "kernel-modules-staging-std-def is installed",
+      "Name": "kernel-modules-staging-std-def"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14505/states.json b/oval/p10/ALT-PU-2024-14505/states.json
new file mode 100644
index 0000000000..a0d762ee0c
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14505/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202414505001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 2:5.10.228-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "2:5.10.228-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14505/tests.json b/oval/p10/ALT-PU-2024-14505/tests.json
new file mode 100644
index 0000000000..0bfca675fe
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14505/tests.json
@@ -0,0 +1,162 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-doc-std is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-headers-modules-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505003",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-headers-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505003"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505004",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-domU-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505004"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505005",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505005"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505006",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-std-def-checkinstall is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505006"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505007",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505007"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505008",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505008"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505009",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505009"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505010",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-ide-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505010"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505011",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505011"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414505012",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-staging-std-def is earlier than 2:5.10.228-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414505012"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414505001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14821/definitions.json b/oval/p10/ALT-PU-2024-14821/definitions.json
new file mode 100644
index 0000000000..e57deb0cb1
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14821/definitions.json
@@ -0,0 +1,106 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202414821",
+      "Version": "oval:org.altlinux.errata:def:202414821",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-14821: package `docs-simply-linux` update to version 10.4-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-14821",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-14821",
+            "Source": "ALTPU"
+          }
+        ],
+        "Description": "This update upgrades docs-simply-linux to version 10.4-alt1. \nSecurity Fix(es):\n\n * #48281: Документация ⁠ ⁠docs-simply-linux, п.4.2.2. В операционной системе Linux: убрать двоеточие перед blkid\n\n * #48282: Документация ⁠docs-simply-linux, п.⁠4.2.2. В операционной системе Linux:  поправки по извлечению съемных носителей",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "Low",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "Bugzilla": [
+            {
+              "ID": "48281",
+              "Href": "https://bugzilla.altlinux.org/48281",
+              "Data": "Документация ⁠ ⁠docs-simply-linux, п.4.2.2. В операционной системе Linux: убрать двоеточие перед blkid"
+            },
+            {
+              "ID": "48282",
+              "Href": "https://bugzilla.altlinux.org/48282",
+              "Data": "Документация ⁠docs-simply-linux, п.⁠4.2.2. В операционной системе Linux:  поправки по извлечению съемных носителей"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414821001",
+                "Comment": "docs-simply-linux is earlier than 0:10.4-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14821/objects.json b/oval/p10/ALT-PU-2024-14821/objects.json
new file mode 100644
index 0000000000..01b680cc80
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14821/objects.json
@@ -0,0 +1,34 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414821001",
+      "Version": "1",
+      "Comment": "docs-simply-linux is installed",
+      "Name": "docs-simply-linux"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14821/states.json b/oval/p10/ALT-PU-2024-14821/states.json
new file mode 100644
index 0000000000..699da47863
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14821/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202414821001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:10.4-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:10.4-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14821/tests.json b/oval/p10/ALT-PU-2024-14821/tests.json
new file mode 100644
index 0000000000..be1d3c4283
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14821/tests.json
@@ -0,0 +1,30 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414821001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "docs-simply-linux is earlier than 0:10.4-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414821001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414821001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14984/definitions.json b/oval/p10/ALT-PU-2024-14984/definitions.json
new file mode 100644
index 0000000000..26cd5b9d6f
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14984/definitions.json
@@ -0,0 +1,111 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202414984",
+      "Version": "oval:org.altlinux.errata:def:202414984",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-14984: package `docs-alt-kworkstation` update to version 10.4-alt4",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-14984",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-14984",
+            "Source": "ALTPU"
+          }
+        ],
+        "Description": "This update upgrades docs-alt-kworkstation to version 10.4-alt4. \nSecurity Fix(es):\n\n * #51823: Документация docs-alt-kworkstation, ⁠70.3. Предустановки: добавить пробел для разделения слов\n\n * #51825: Документация docs-alt-kworkstation, ⁠71.3. Добавление/удаление правил: добавить запятую\n\n * #51826: Документация docs-alt-kworkstation, ⁠70.2. Список USB-устройств: изменить на \"Сканировать устройства\"",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "Low",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "Bugzilla": [
+            {
+              "ID": "51823",
+              "Href": "https://bugzilla.altlinux.org/51823",
+              "Data": "Документация docs-alt-kworkstation, ⁠70.3. Предустановки: добавить пробел для разделения слов"
+            },
+            {
+              "ID": "51825",
+              "Href": "https://bugzilla.altlinux.org/51825",
+              "Data": "Документация docs-alt-kworkstation, ⁠71.3. Добавление/удаление правил: добавить запятую"
+            },
+            {
+              "ID": "51826",
+              "Href": "https://bugzilla.altlinux.org/51826",
+              "Data": "Документация docs-alt-kworkstation, ⁠70.2. Список USB-устройств: изменить на \"Сканировать устройства\""
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202414984001",
+                "Comment": "docs-alt-kworkstation is earlier than 0:10.4-alt4"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14984/objects.json b/oval/p10/ALT-PU-2024-14984/objects.json
new file mode 100644
index 0000000000..8047b1ee54
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14984/objects.json
@@ -0,0 +1,34 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202414984001",
+      "Version": "1",
+      "Comment": "docs-alt-kworkstation is installed",
+      "Name": "docs-alt-kworkstation"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14984/states.json b/oval/p10/ALT-PU-2024-14984/states.json
new file mode 100644
index 0000000000..93b49551e7
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14984/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202414984001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:10.4-alt4",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:10.4-alt4",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-14984/tests.json b/oval/p10/ALT-PU-2024-14984/tests.json
new file mode 100644
index 0000000000..911c103163
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-14984/tests.json
@@ -0,0 +1,30 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202414984001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "docs-alt-kworkstation is earlier than 0:10.4-alt4",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202414984001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202414984001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15041/definitions.json b/oval/p10/ALT-PU-2024-15041/definitions.json
new file mode 100644
index 0000000000..d9025580ce
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15041/definitions.json
@@ -0,0 +1,731 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415041",
+      "Version": "oval:org.altlinux.errata:def:202415041",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15041: package `yandex-browser-stable` update to version 24.7.6.1018-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15041",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15041",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "BDU:2024-03377",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-03377",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-03378",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-03378",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-03379",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-03379",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-03876",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-03876",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-03877",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-03877",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04338",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04338",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04339",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04339",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04341",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04341",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04342",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04342",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04460",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04460",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04865",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04865",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-04866",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-04866",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06067",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06067",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06109",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06109",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06110",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06110",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06111",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06111",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06112",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06112",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06113",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06113",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06114",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06114",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06115",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06115",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06132",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06132",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06562",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06562",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-06704",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-06704",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07084",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07084",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "CVE-2024-4058",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4058",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-4059",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4059",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-4060",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4060",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-4331",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4331",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-4368",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4368",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-4558",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-4559",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4559",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-5274",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-5274",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-5496",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-5496",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-5497",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-5497",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-5498",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-5498",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-5499",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-5499",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6473",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6473",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6772",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6772",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6773",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6773",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6774",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6774",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6775",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6775",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6776",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6776",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6777",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6777",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6778",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6778",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6779",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6779",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-6990",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6990",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-7965",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-7965",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-7971",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-7971",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades yandex-browser-stable to version 24.7.6.1018-alt1. \nSecurity Fix(es):\n\n * BDU:2024-03377: Уязвимость компонента Dawn браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-03378: Уязвимость интерфейса обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2024-03379: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти защитный механизм песочницы и выполнить произвольный код\n\n * BDU:2024-03876: Уязвимость технологии Picture In Picture браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-03877: Уязвимость компонента Dawn браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-04338: Уязвимость компонента Keyboard Inputs браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-04339: Уязвимость интерфейса Presentation API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-04341: Уязвимость интерфейса Streams API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-04342: Уязвимость интерфейса Media Session API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-04460: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome , позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-04865: Уязвимость элемента WebAudio браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-04866: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-06067: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2024-06109: Уязвимость компонента Audio браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06110: Уязвимость функции Navigation браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06111: Уязвимость компонента Media Stream (Трансляция) браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06112: Уязвимость функции захват экрана (Screen Capture) браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06113: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти защитный механизм песочницы, получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06114: Уязвимость набора инструментов для веб-разработки DevTools браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06115: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2024-06132: Уязвимость компонента Dawn браузеров Google Chrome и Microsoft Edge операционных систем Android, позволяющая нарушителю обойти защитный механизм песочницы и выполнить произвольный код\n\n * BDU:2024-06562: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код с помощью специально сформированной HTML-страницы\n\n * BDU:2024-06704: Уязвимость браузера Yandex Browser, связана с использованием ненадёжного пути поиска, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-07084: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю повредить динамическую память\n\n * CVE-2024-4058: Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\n\n * CVE-2024-4059: Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to leak cross-site data via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-4060: Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-4331: Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-4368: Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-4558: Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-4559: Heap buffer overflow in WebAudio in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-5274: Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-5496: Use after free in Media Session in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-5497: Out of bounds memory access in Browser UI in Google Chrome prior to 125.0.6422.141 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-5498: Use after free in Presentation API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-5499: Out of bounds write in Streams API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6473: Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used.\n\n * CVE-2024-6772: Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6773: Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6774: Use after free in Screen Capture in Google Chrome prior to 126.0.6478.182 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6775: Use after free in Media Stream in Google Chrome prior to 126.0.6478.182 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6776: Use after free in Audio in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6777: Use after free in Navigation in Google Chrome prior to 126.0.6478.182 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)\n\n * CVE-2024-6778: Race in DevTools in Google Chrome prior to 126.0.6478.182 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)\n\n * CVE-2024-6779: Out of bounds memory access in V8 in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-6990: Uninitialized Use in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)\n\n * CVE-2024-7965: Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2024-7971: Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * #49811: Устанавливает стороннее ПО неизвестного происхождения\n\n * #50127: Автозапуск портит рабочий стол KDE Plasma\n\n * #50301: Виснет при наличии виртуальной клавиатуры Maliit в Wayland\n\n * #51152: Перестали применяться анимационные фоны в Яндекс браузере после обновления ffmpeg-plugin-browser",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "Critical",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": [
+            {
+              "ID": "BDU:2024-03377",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-03377",
+              "Impact": "High",
+              "Public": "20240409"
+            },
+            {
+              "ID": "BDU:2024-03378",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+              "CWE": "CWE-125",
+              "Href": "https://bdu.fstec.ru/vul/2024-03378",
+              "Impact": "Low",
+              "Public": "20240408"
+            },
+            {
+              "ID": "BDU:2024-03379",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://bdu.fstec.ru/vul/2024-03379",
+              "Impact": "Critical",
+              "Public": "20240402"
+            },
+            {
+              "ID": "BDU:2024-03876",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-119, CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-03876",
+              "Impact": "High",
+              "Public": "20240416"
+            },
+            {
+              "ID": "BDU:2024-03877",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-119, CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-03877",
+              "Impact": "High",
+              "Public": "20240416"
+            },
+            {
+              "ID": "BDU:2024-04338",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-125",
+              "Href": "https://bdu.fstec.ru/vul/2024-04338",
+              "Impact": "High",
+              "Public": "20240507"
+            },
+            {
+              "ID": "BDU:2024-04339",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-04339",
+              "Impact": "High",
+              "Public": "20240509"
+            },
+            {
+              "ID": "BDU:2024-04341",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-787",
+              "Href": "https://bdu.fstec.ru/vul/2024-04341",
+              "Impact": "High",
+              "Public": "20240511"
+            },
+            {
+              "ID": "BDU:2024-04342",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-04342",
+              "Impact": "High",
+              "Public": "20240506"
+            },
+            {
+              "ID": "BDU:2024-04460",
+              "CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
+              "CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://bdu.fstec.ru/vul/2024-04460",
+              "Impact": "High",
+              "Public": "20240523"
+            },
+            {
+              "ID": "BDU:2024-04865",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-122",
+              "Href": "https://bdu.fstec.ru/vul/2024-04865",
+              "Impact": "High",
+              "Public": "20240507"
+            },
+            {
+              "ID": "BDU:2024-04866",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-04866",
+              "Impact": "High",
+              "Public": "20240507"
+            },
+            {
+              "ID": "BDU:2024-06067",
+              "CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
+              "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
+              "CWE": "CWE-125, CWE-358",
+              "Href": "https://bdu.fstec.ru/vul/2024-06067",
+              "Impact": "Low",
+              "Public": "20240612"
+            },
+            {
+              "ID": "BDU:2024-06109",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-06109",
+              "Impact": "High",
+              "Public": "20240612"
+            },
+            {
+              "ID": "BDU:2024-06110",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-06110",
+              "Impact": "High",
+              "Public": "20240607"
+            },
+            {
+              "ID": "BDU:2024-06111",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-06111",
+              "Impact": "High",
+              "Public": "20240615"
+            },
+            {
+              "ID": "BDU:2024-06112",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-416",
+              "Href": "https://bdu.fstec.ru/vul/2024-06112",
+              "Impact": "High",
+              "Public": "20240613"
+            },
+            {
+              "ID": "BDU:2024-06113",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-119",
+              "Href": "https://bdu.fstec.ru/vul/2024-06113",
+              "Impact": "High",
+              "Public": "20240706"
+            },
+            {
+              "ID": "BDU:2024-06114",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-362, CWE-366",
+              "Href": "https://bdu.fstec.ru/vul/2024-06114",
+              "Impact": "High",
+              "Public": "20240516"
+            },
+            {
+              "ID": "BDU:2024-06115",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://bdu.fstec.ru/vul/2024-06115",
+              "Impact": "High",
+              "Public": "20240617"
+            },
+            {
+              "ID": "BDU:2024-06132",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-457",
+              "Href": "https://bdu.fstec.ru/vul/2024-06132",
+              "Impact": "High",
+              "Public": "20240715"
+            },
+            {
+              "ID": "BDU:2024-06562",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://bdu.fstec.ru/vul/2024-06562",
+              "Impact": "High",
+              "Public": "20240821"
+            },
+            {
+              "ID": "BDU:2024-06704",
+              "CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
+              "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+              "CWE": "CWE-426",
+              "Href": "https://bdu.fstec.ru/vul/2024-06704",
+              "Impact": "High",
+              "Public": "20240903"
+            },
+            {
+              "ID": "BDU:2024-07084",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-358",
+              "Href": "https://bdu.fstec.ru/vul/2024-07084",
+              "Impact": "High",
+              "Public": "20240821"
+            }
+          ],
+          "CVEs": [
+            {
+              "ID": "CVE-2024-4058",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4058",
+              "Impact": "High",
+              "Public": "20240501"
+            },
+            {
+              "ID": "CVE-2024-4059",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4059",
+              "Impact": "None",
+              "Public": "20240501"
+            },
+            {
+              "ID": "CVE-2024-4060",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4060",
+              "Impact": "None",
+              "Public": "20240501"
+            },
+            {
+              "ID": "CVE-2024-4331",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4331",
+              "Impact": "None",
+              "Public": "20240501"
+            },
+            {
+              "ID": "CVE-2024-4368",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4368",
+              "Impact": "None",
+              "Public": "20240501"
+            },
+            {
+              "ID": "CVE-2024-4558",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
+              "Impact": "None",
+              "Public": "20240507"
+            },
+            {
+              "ID": "CVE-2024-4559",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4559",
+              "Impact": "None",
+              "Public": "20240507"
+            },
+            {
+              "ID": "CVE-2024-5274",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5274",
+              "Impact": "High",
+              "Public": "20240528"
+            },
+            {
+              "ID": "CVE-2024-5496",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5496",
+              "Impact": "None",
+              "Public": "20240530"
+            },
+            {
+              "ID": "CVE-2024-5497",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5497",
+              "Impact": "None",
+              "Public": "20240530"
+            },
+            {
+              "ID": "CVE-2024-5498",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5498",
+              "Impact": "None",
+              "Public": "20240530"
+            },
+            {
+              "ID": "CVE-2024-5499",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-5499",
+              "Impact": "None",
+              "Public": "20240530"
+            },
+            {
+              "ID": "CVE-2024-6473",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-426",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6473",
+              "Impact": "High",
+              "Public": "20240903"
+            },
+            {
+              "ID": "CVE-2024-6772",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6772",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6773",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6773",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6774",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6774",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6775",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6775",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6776",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6776",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6777",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6777",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6778",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6778",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6779",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6779",
+              "Impact": "None",
+              "Public": "20240716"
+            },
+            {
+              "ID": "CVE-2024-6990",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-908",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6990",
+              "Impact": "High",
+              "Public": "20240801"
+            },
+            {
+              "ID": "CVE-2024-7965",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-787",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-7965",
+              "Impact": "High",
+              "Public": "20240821"
+            },
+            {
+              "ID": "CVE-2024-7971",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-843",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-7971",
+              "Impact": "High",
+              "Public": "20240821"
+            }
+          ],
+          "Bugzilla": [
+            {
+              "ID": "49811",
+              "Href": "https://bugzilla.altlinux.org/49811",
+              "Data": "Устанавливает стороннее ПО неизвестного происхождения"
+            },
+            {
+              "ID": "50127",
+              "Href": "https://bugzilla.altlinux.org/50127",
+              "Data": "Автозапуск портит рабочий стол KDE Plasma"
+            },
+            {
+              "ID": "50301",
+              "Href": "https://bugzilla.altlinux.org/50301",
+              "Data": "Виснет при наличии виртуальной клавиатуры Maliit в Wayland"
+            },
+            {
+              "ID": "51152",
+              "Href": "https://bugzilla.altlinux.org/51152",
+              "Data": "Перестали применяться анимационные фоны в Яндекс браузере после обновления ffmpeg-plugin-browser"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415041001",
+                "Comment": "yandex-browser-stable is earlier than 0:24.7.6.1018-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15041/objects.json b/oval/p10/ALT-PU-2024-15041/objects.json
new file mode 100644
index 0000000000..8ead26a57e
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15041/objects.json
@@ -0,0 +1,34 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415041001",
+      "Version": "1",
+      "Comment": "yandex-browser-stable is installed",
+      "Name": "yandex-browser-stable"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15041/states.json b/oval/p10/ALT-PU-2024-15041/states.json
new file mode 100644
index 0000000000..b5db369153
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15041/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415041001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:24.7.6.1018-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:24.7.6.1018-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15041/tests.json b/oval/p10/ALT-PU-2024-15041/tests.json
new file mode 100644
index 0000000000..10c116bce0
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15041/tests.json
@@ -0,0 +1,30 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415041001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "yandex-browser-stable is earlier than 0:24.7.6.1018-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415041001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415041001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15053/definitions.json b/oval/p10/ALT-PU-2024-15053/definitions.json
new file mode 100644
index 0000000000..cac6ae011e
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15053/definitions.json
@@ -0,0 +1,101 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415053",
+      "Version": "oval:org.altlinux.errata:def:202415053",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15053: package `lxqt-config` update to version 1.4.0-alt2",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15053",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15053",
+            "Source": "ALTPU"
+          }
+        ],
+        "Description": "This update upgrades lxqt-config to version 1.4.0-alt2. \nSecurity Fix(es):\n\n * #51891: Окно настроек монитора lxqt не открывается",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "Low",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "Bugzilla": [
+            {
+              "ID": "51891",
+              "Href": "https://bugzilla.altlinux.org/51891",
+              "Data": "Окно настроек монитора lxqt не открывается"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415053001",
+                "Comment": "lxqt-config is earlier than 0:1.4.0-alt2"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15053/objects.json b/oval/p10/ALT-PU-2024-15053/objects.json
new file mode 100644
index 0000000000..239d8dfb78
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15053/objects.json
@@ -0,0 +1,34 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415053001",
+      "Version": "1",
+      "Comment": "lxqt-config is installed",
+      "Name": "lxqt-config"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15053/states.json b/oval/p10/ALT-PU-2024-15053/states.json
new file mode 100644
index 0000000000..6711f0edc3
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15053/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415053001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:1.4.0-alt2",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:1.4.0-alt2",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15053/tests.json b/oval/p10/ALT-PU-2024-15053/tests.json
new file mode 100644
index 0000000000..e69861f2b9
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15053/tests.json
@@ -0,0 +1,30 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415053001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "lxqt-config is earlier than 0:1.4.0-alt2",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415053001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415053001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15140/definitions.json b/oval/p10/ALT-PU-2024-15140/definitions.json
new file mode 100644
index 0000000000..bf797f2a7e
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15140/definitions.json
@@ -0,0 +1,114 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415140",
+      "Version": "oval:org.altlinux.errata:def:202415140",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15140: package `python-module-lxml` update to version 4.6.3.0.16.git5ecb40bc-alt1.p10.1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p10"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15140",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15140",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "CVE-2022-2309",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2309",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades python-module-lxml to version 4.6.3.0.16.git5ecb40bc-alt1.p10.1. \nSecurity Fix(es):\n\n * CVE-2022-2309: NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "High",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2022-2309",
+              "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-476",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2309",
+              "Impact": "High",
+              "Public": "20220705"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:10",
+              "cpe:/o:alt:workstation:10",
+              "cpe:/o:alt:server:10",
+              "cpe:/o:alt:server-v:10",
+              "cpe:/o:alt:education:10",
+              "cpe:/o:alt:slinux:10",
+              "cpe:/o:alt:starterkit:p10",
+              "cpe:/o:alt:kworkstation:10.1",
+              "cpe:/o:alt:workstation:10.1",
+              "cpe:/o:alt:server:10.1",
+              "cpe:/o:alt:server-v:10.1",
+              "cpe:/o:alt:education:10.1",
+              "cpe:/o:alt:slinux:10.1",
+              "cpe:/o:alt:starterkit:10.1",
+              "cpe:/o:alt:kworkstation:10.2",
+              "cpe:/o:alt:workstation:10.2",
+              "cpe:/o:alt:server:10.2",
+              "cpe:/o:alt:server-v:10.2",
+              "cpe:/o:alt:education:10.2",
+              "cpe:/o:alt:slinux:10.2",
+              "cpe:/o:alt:starterkit:10.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:2001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415140001",
+                "Comment": "python-module-lxml is earlier than 0:4.6.3.0.16.git5ecb40bc-alt1.p10.1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415140002",
+                "Comment": "python-module-lxml-doc is earlier than 0:4.6.3.0.16.git5ecb40bc-alt1.p10.1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15140/objects.json b/oval/p10/ALT-PU-2024-15140/objects.json
new file mode 100644
index 0000000000..53d811d7d6
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15140/objects.json
@@ -0,0 +1,40 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:2001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415140001",
+      "Version": "1",
+      "Comment": "python-module-lxml is installed",
+      "Name": "python-module-lxml"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415140002",
+      "Version": "1",
+      "Comment": "python-module-lxml-doc is installed",
+      "Name": "python-module-lxml-doc"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15140/states.json b/oval/p10/ALT-PU-2024-15140/states.json
new file mode 100644
index 0000000000..afeae52c6a
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15140/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:2001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415140001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 0:4.6.3.0.16.git5ecb40bc-alt1.p10.1",
+      "Arch": {},
+      "EVR": {
+        "Text": "0:4.6.3.0.16.git5ecb40bc-alt1.p10.1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p10/ALT-PU-2024-15140/tests.json b/oval/p10/ALT-PU-2024-15140/tests.json
new file mode 100644
index 0000000000..aa4b4ebc66
--- /dev/null
+++ b/oval/p10/ALT-PU-2024-15140/tests.json
@@ -0,0 +1,42 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:2001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p10' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:2001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:2001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415140001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "python-module-lxml is earlier than 0:4.6.3.0.16.git5ecb40bc-alt1.p10.1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415140001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415140001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415140002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "python-module-lxml-doc is earlier than 0:4.6.3.0.16.git5ecb40bc-alt1.p10.1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415140002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415140001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2019-1959/definitions.json b/oval/p9/ALT-PU-2019-1959/definitions.json
index c7a5c0f61a..fefa9b2777 100644
--- a/oval/p9/ALT-PU-2019-1959/definitions.json
+++ b/oval/p9/ALT-PU-2019-1959/definitions.json
@@ -44,6 +44,26 @@
             "RefURL": "https://bdu.fstec.ru/vul/2020-01676",
             "Source": "BDU"
           },
+          {
+            "RefID": "BDU:2024-07676",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07676",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07677",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07677",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07679",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07679",
+            "Source": "BDU"
+          },
+          {
+            "RefID": "BDU:2024-07680",
+            "RefURL": "https://bdu.fstec.ru/vul/2024-07680",
+            "Source": "BDU"
+          },
           {
             "RefID": "CVE-2019-11038",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11038",
@@ -58,9 +78,29 @@
             "RefID": "CVE-2019-11040",
             "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11040",
             "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8925",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8926",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-8927",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-9026",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+            "Source": "CVE"
           }
         ],
-        "Description": "This update upgrades php7 to version 7.2.19-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01416: Уязвимость функции exif_iif_add_value интерпретатора языка программирования PHP, связанная с чтением данных за допустимыми границами, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01419: Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01676: Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * CVE-2019-11038: When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.\n\n * CVE-2019-11039: Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.\n\n * CVE-2019-11040: When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.",
+        "Description": "This update upgrades php7 to version 7.2.19-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01416: Уязвимость функции exif_iif_add_value интерпретатора языка программирования PHP, связанная с чтением данных за допустимыми границами, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01419: Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01676: Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2024-07676: Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07677: Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07679: Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2024-07680: Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * CVE-2019-11038: When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.\n\n * CVE-2019-11039: Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.\n\n * CVE-2019-11040: When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.\n\n * CVE-2024-8925: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.\n\n * CVE-2024-8926: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows \"Best Fit\" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.\n\n * CVE-2024-8927: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.\n\n * CVE-2024-9026: In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.",
         "Advisory": {
           "From": "errata.altlinux.org",
           "Severity": "Critical",
@@ -69,7 +109,7 @@
             "Date": "2019-06-02"
           },
           "Updated": {
-            "Date": "2019-06-02"
+            "Date": "2024-11-14"
           },
           "BDUs": [
             {
@@ -98,6 +138,42 @@
               "Href": "https://bdu.fstec.ru/vul/2020-01676",
               "Impact": "High",
               "Public": "20190505"
+            },
+            {
+              "ID": "BDU:2024-07676",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-20",
+              "Href": "https://bdu.fstec.ru/vul/2024-07676",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07677",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://bdu.fstec.ru/vul/2024-07677",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07679",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-254",
+              "Href": "https://bdu.fstec.ru/vul/2024-07679",
+              "Impact": "Critical",
+              "Public": "20240929"
+            },
+            {
+              "ID": "BDU:2024-07680",
+              "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
+              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-778",
+              "Href": "https://bdu.fstec.ru/vul/2024-07680",
+              "Impact": "Critical",
+              "Public": "20240929"
             }
           ],
           "CVEs": [
@@ -127,6 +203,38 @@
               "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11040",
               "Impact": "Critical",
               "Public": "20190619"
+            },
+            {
+              "ID": "CVE-2024-8925",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8925",
+              "Impact": "Low",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8926",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+              "CWE": "CWE-78",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8926",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-8927",
+              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8927",
+              "Impact": "High",
+              "Public": "20241008"
+            },
+            {
+              "ID": "CVE-2024-9026",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+              "CWE": "NVD-CWE-Other",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9026",
+              "Impact": "Low",
+              "Public": "20241008"
             }
           ],
           "AffectedCPEs": {
diff --git a/oval/p9/ALT-PU-2024-15467/definitions.json b/oval/p9/ALT-PU-2024-15467/definitions.json
new file mode 100644
index 0000000000..def66f5f58
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15467/definitions.json
@@ -0,0 +1,170 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415467",
+      "Version": "oval:org.altlinux.errata:def:202415467",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15467: package `kernel-image-std-def` update to version 5.4.285-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p9"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15467",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15467",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "CVE-2024-50116",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50116",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-50117",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50117",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades kernel-image-std-def to version 5.4.285-alt1. \nSecurity Fix(es):\n\n * CVE-2024-50116: In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug due to missing clearing of buffer delay flag\n\nSyzbot reported that after nilfs2 reads a corrupted file system image\nand degrades to read-only, the BUG_ON check for the buffer delay flag\nin submit_bh_wbc() may fail, causing a kernel bug.\n\nThis is because the buffer delay flag is not cleared when clearing the\nbuffer state flags to discard a page/folio or a buffer head. So, fix\nthis.\n\nThis became necessary when the use of nilfs2's own page clear routine\nwas expanded.  This state inconsistency does not occur if the buffer\nis written normally by log writing.\n\n * CVE-2024-50117: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Guard against bad data for ATIF ACPI method\n\nIf a BIOS provides bad data in response to an ATIF method call\nthis causes a NULL pointer dereference in the caller.\n\n```\n? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))\n? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434)\n? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2))\n? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1))\n? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642)\n? exc_page_fault (arch/x86/mm/fault.c:1542)\n? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)\n? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu\n? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu\n```\n\nIt has been encountered on at least one system, so guard for it.\n\n(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "Low",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2024-50116",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50116",
+              "Impact": "Low",
+              "Public": "20241105"
+            },
+            {
+              "ID": "CVE-2024-50117",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-476",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50117",
+              "Impact": "Low",
+              "Public": "20241105"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:9",
+              "cpe:/o:alt:workstation:9",
+              "cpe:/o:alt:server:9",
+              "cpe:/o:alt:server-v:9",
+              "cpe:/o:alt:education:9",
+              "cpe:/o:alt:slinux:9",
+              "cpe:/o:alt:starterkit:p9",
+              "cpe:/o:alt:kworkstation:9.1",
+              "cpe:/o:alt:workstation:9.1",
+              "cpe:/o:alt:server:9.1",
+              "cpe:/o:alt:server-v:9.1",
+              "cpe:/o:alt:education:9.1",
+              "cpe:/o:alt:slinux:9.1",
+              "cpe:/o:alt:starterkit:9.1",
+              "cpe:/o:alt:kworkstation:9.2",
+              "cpe:/o:alt:workstation:9.2",
+              "cpe:/o:alt:server:9.2",
+              "cpe:/o:alt:server-v:9.2",
+              "cpe:/o:alt:education:9.2",
+              "cpe:/o:alt:slinux:9.2",
+              "cpe:/o:alt:starterkit:9.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:1001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467001",
+                "Comment": "kernel-doc-std is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467002",
+                "Comment": "kernel-headers-modules-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467003",
+                "Comment": "kernel-headers-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467004",
+                "Comment": "kernel-image-domU-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467005",
+                "Comment": "kernel-image-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467006",
+                "Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467007",
+                "Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467008",
+                "Comment": "kernel-modules-drm-radeon-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467009",
+                "Comment": "kernel-modules-drm-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467010",
+                "Comment": "kernel-modules-ide-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467011",
+                "Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467012",
+                "Comment": "kernel-modules-staging-std-def is earlier than 2:5.4.285-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415467013",
+                "Comment": "kernel-modules-v4l-std-def is earlier than 2:5.4.285-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15467/objects.json b/oval/p9/ALT-PU-2024-15467/objects.json
new file mode 100644
index 0000000000..e73db8de34
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15467/objects.json
@@ -0,0 +1,106 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:1001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467001",
+      "Version": "1",
+      "Comment": "kernel-doc-std is installed",
+      "Name": "kernel-doc-std"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467002",
+      "Version": "1",
+      "Comment": "kernel-headers-modules-std-def is installed",
+      "Name": "kernel-headers-modules-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467003",
+      "Version": "1",
+      "Comment": "kernel-headers-std-def is installed",
+      "Name": "kernel-headers-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467004",
+      "Version": "1",
+      "Comment": "kernel-image-domU-std-def is installed",
+      "Name": "kernel-image-domU-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467005",
+      "Version": "1",
+      "Comment": "kernel-image-std-def is installed",
+      "Name": "kernel-image-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467006",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-ancient-std-def is installed",
+      "Name": "kernel-modules-drm-ancient-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467007",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-nouveau-std-def is installed",
+      "Name": "kernel-modules-drm-nouveau-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467008",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-radeon-std-def is installed",
+      "Name": "kernel-modules-drm-radeon-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467009",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-std-def is installed",
+      "Name": "kernel-modules-drm-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467010",
+      "Version": "1",
+      "Comment": "kernel-modules-ide-std-def is installed",
+      "Name": "kernel-modules-ide-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467011",
+      "Version": "1",
+      "Comment": "kernel-modules-midgard-be-m1000-std-def is installed",
+      "Name": "kernel-modules-midgard-be-m1000-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467012",
+      "Version": "1",
+      "Comment": "kernel-modules-staging-std-def is installed",
+      "Name": "kernel-modules-staging-std-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415467013",
+      "Version": "1",
+      "Comment": "kernel-modules-v4l-std-def is installed",
+      "Name": "kernel-modules-v4l-std-def"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15467/states.json b/oval/p9/ALT-PU-2024-15467/states.json
new file mode 100644
index 0000000000..87a970eca1
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15467/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:1001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415467001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 2:5.4.285-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "2:5.4.285-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15467/tests.json b/oval/p9/ALT-PU-2024-15467/tests.json
new file mode 100644
index 0000000000..d0f68cbc77
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15467/tests.json
@@ -0,0 +1,174 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:1001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p9' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:1001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:1001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-doc-std is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-headers-modules-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467003",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-headers-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467003"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467004",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-domU-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467004"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467005",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467005"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467006",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467006"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467007",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467007"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467008",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-radeon-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467008"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467009",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467009"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467010",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-ide-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467010"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467011",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467011"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467012",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-staging-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467012"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415467013",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-v4l-std-def is earlier than 2:5.4.285-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415467013"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415467001"
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15473/definitions.json b/oval/p9/ALT-PU-2024-15473/definitions.json
new file mode 100644
index 0000000000..1b3099247e
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15473/definitions.json
@@ -0,0 +1,171 @@
+{
+  "Definition": [
+    {
+      "ID": "oval:org.altlinux.errata:def:202415473",
+      "Version": "oval:org.altlinux.errata:def:202415473",
+      "Class": "patch",
+      "Metadata": {
+        "Title": "ALT-PU-2024-15473: package `kernel-image-un-def` update to version 5.10.229-alt1",
+        "AffectedList": [
+          {
+            "Family": "unix",
+            "Platforms": [
+              "ALT Linux branch p9"
+            ],
+            "Products": [
+              "ALT Server",
+              "ALT Virtualization Server",
+              "ALT Workstation",
+              "ALT Workstation K",
+              "ALT Education",
+              "Simply Linux",
+              "Starterkit"
+            ]
+          }
+        ],
+        "References": [
+          {
+            "RefID": "ALT-PU-2024-15473",
+            "RefURL": "https://errata.altlinux.org/ALT-PU-2024-15473",
+            "Source": "ALTPU"
+          },
+          {
+            "RefID": "CVE-2024-50115",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50115",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-50116",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50116",
+            "Source": "CVE"
+          },
+          {
+            "RefID": "CVE-2024-50117",
+            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-50117",
+            "Source": "CVE"
+          }
+        ],
+        "Description": "This update upgrades kernel-image-un-def to version 5.10.229-alt1. \nSecurity Fix(es):\n\n * CVE-2024-50115: In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory\n\nIgnore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits\n4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't\nenforce 32-byte alignment of nCR3.\n\nIn the absolute worst case scenario, failure to ignore bits 4:0 can result\nin an out-of-bounds read, e.g. if the target page is at the end of a\nmemslot, and the VMM isn't using guard pages.\n\nPer the APM:\n\n  The CR3 register points to the base address of the page-directory-pointer\n  table. The page-directory-pointer table is aligned on a 32-byte boundary,\n  with the low 5 address bits 4:0 assumed to be 0.\n\nAnd the SDM's much more explicit:\n\n  4:0    Ignored\n\nNote, KVM gets this right when loading PDPTRs, it's only the nSVM flow\nthat is broken.\n\n * CVE-2024-50116: In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug due to missing clearing of buffer delay flag\n\nSyzbot reported that after nilfs2 reads a corrupted file system image\nand degrades to read-only, the BUG_ON check for the buffer delay flag\nin submit_bh_wbc() may fail, causing a kernel bug.\n\nThis is because the buffer delay flag is not cleared when clearing the\nbuffer state flags to discard a page/folio or a buffer head. So, fix\nthis.\n\nThis became necessary when the use of nilfs2's own page clear routine\nwas expanded.  This state inconsistency does not occur if the buffer\nis written normally by log writing.\n\n * CVE-2024-50117: In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Guard against bad data for ATIF ACPI method\n\nIf a BIOS provides bad data in response to an ATIF method call\nthis causes a NULL pointer dereference in the caller.\n\n```\n? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))\n? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434)\n? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2))\n? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1))\n? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642)\n? exc_page_fault (arch/x86/mm/fault.c:1542)\n? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)\n? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu\n? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu\n```\n\nIt has been encountered on at least one system, so guard for it.\n\n(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)",
+        "Advisory": {
+          "From": "errata.altlinux.org",
+          "Severity": "High",
+          "Rights": "Copyright 2024 BaseALT Ltd.",
+          "Issued": {
+            "Date": "2024-11-13"
+          },
+          "Updated": {
+            "Date": "2024-11-13"
+          },
+          "BDUs": null,
+          "CVEs": [
+            {
+              "ID": "CVE-2024-50115",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
+              "CWE": "CWE-125",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50115",
+              "Impact": "High",
+              "Public": "20241105"
+            },
+            {
+              "ID": "CVE-2024-50116",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "NVD-CWE-noinfo",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50116",
+              "Impact": "Low",
+              "Public": "20241105"
+            },
+            {
+              "ID": "CVE-2024-50117",
+              "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+              "CWE": "CWE-476",
+              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-50117",
+              "Impact": "Low",
+              "Public": "20241105"
+            }
+          ],
+          "AffectedCPEs": {
+            "CPEs": [
+              "cpe:/o:alt:kworkstation:9",
+              "cpe:/o:alt:workstation:9",
+              "cpe:/o:alt:server:9",
+              "cpe:/o:alt:server-v:9",
+              "cpe:/o:alt:education:9",
+              "cpe:/o:alt:slinux:9",
+              "cpe:/o:alt:starterkit:p9",
+              "cpe:/o:alt:kworkstation:9.1",
+              "cpe:/o:alt:workstation:9.1",
+              "cpe:/o:alt:server:9.1",
+              "cpe:/o:alt:server-v:9.1",
+              "cpe:/o:alt:education:9.1",
+              "cpe:/o:alt:slinux:9.1",
+              "cpe:/o:alt:starterkit:9.1",
+              "cpe:/o:alt:kworkstation:9.2",
+              "cpe:/o:alt:workstation:9.2",
+              "cpe:/o:alt:server:9.2",
+              "cpe:/o:alt:server-v:9.2",
+              "cpe:/o:alt:education:9.2",
+              "cpe:/o:alt:slinux:9.2",
+              "cpe:/o:alt:starterkit:9.2"
+            ]
+          }
+        }
+      },
+      "Criteria": {
+        "Operator": "AND",
+        "Criterions": [
+          {
+            "TestRef": "oval:org.altlinux.errata:tst:1001",
+            "Comment": "ALT Linux must be installed"
+          }
+        ],
+        "Criterias": [
+          {
+            "Operator": "OR",
+            "Criterions": [
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473001",
+                "Comment": "kernel-doc-un is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473002",
+                "Comment": "kernel-headers-modules-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473003",
+                "Comment": "kernel-headers-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473004",
+                "Comment": "kernel-image-domU-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473005",
+                "Comment": "kernel-image-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473006",
+                "Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473007",
+                "Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473008",
+                "Comment": "kernel-modules-drm-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473009",
+                "Comment": "kernel-modules-ide-un-def is earlier than 1:5.10.229-alt1"
+              },
+              {
+                "TestRef": "oval:org.altlinux.errata:tst:202415473010",
+                "Comment": "kernel-modules-staging-un-def is earlier than 1:5.10.229-alt1"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15473/objects.json b/oval/p9/ALT-PU-2024-15473/objects.json
new file mode 100644
index 0000000000..855c72df7e
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15473/objects.json
@@ -0,0 +1,88 @@
+{
+  "TextFileContent54Objects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:1001",
+      "Version": "1",
+      "Comment": "Evaluate `/etc/os-release` file content",
+      "Path": {
+        "Datatype": "string",
+        "Text": "/etc"
+      },
+      "Filepath": {
+        "Datatype": "string",
+        "Text": "os-release"
+      },
+      "Pattern": {
+        "Datatype": "string",
+        "Operation": "pattern match",
+        "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
+      },
+      "Instance": {
+        "Datatype": "int",
+        "Text": "1"
+      }
+    }
+  ],
+  "RPMInfoObjects": [
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473001",
+      "Version": "1",
+      "Comment": "kernel-doc-un is installed",
+      "Name": "kernel-doc-un"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473002",
+      "Version": "1",
+      "Comment": "kernel-headers-modules-un-def is installed",
+      "Name": "kernel-headers-modules-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473003",
+      "Version": "1",
+      "Comment": "kernel-headers-un-def is installed",
+      "Name": "kernel-headers-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473004",
+      "Version": "1",
+      "Comment": "kernel-image-domU-un-def is installed",
+      "Name": "kernel-image-domU-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473005",
+      "Version": "1",
+      "Comment": "kernel-image-un-def is installed",
+      "Name": "kernel-image-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473006",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-ancient-un-def is installed",
+      "Name": "kernel-modules-drm-ancient-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473007",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-nouveau-un-def is installed",
+      "Name": "kernel-modules-drm-nouveau-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473008",
+      "Version": "1",
+      "Comment": "kernel-modules-drm-un-def is installed",
+      "Name": "kernel-modules-drm-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473009",
+      "Version": "1",
+      "Comment": "kernel-modules-ide-un-def is installed",
+      "Name": "kernel-modules-ide-un-def"
+    },
+    {
+      "ID": "oval:org.altlinux.errata:obj:202415473010",
+      "Version": "1",
+      "Comment": "kernel-modules-staging-un-def is installed",
+      "Name": "kernel-modules-staging-un-def"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15473/states.json b/oval/p9/ALT-PU-2024-15473/states.json
new file mode 100644
index 0000000000..bd39def310
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15473/states.json
@@ -0,0 +1,23 @@
+{
+  "TextFileContent54State": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:1001",
+      "Version": "1",
+      "Text": {}
+    }
+  ],
+  "RPMInfoStates": [
+    {
+      "ID": "oval:org.altlinux.errata:ste:202415473001",
+      "Version": "1",
+      "Comment": "package EVR is earlier than 1:5.10.229-alt1",
+      "Arch": {},
+      "EVR": {
+        "Text": "1:5.10.229-alt1",
+        "Datatype": "evr_string",
+        "Operation": "less than"
+      },
+      "Subexpression": {}
+    }
+  ]
+}
\ No newline at end of file
diff --git a/oval/p9/ALT-PU-2024-15473/tests.json b/oval/p9/ALT-PU-2024-15473/tests.json
new file mode 100644
index 0000000000..80e99212ec
--- /dev/null
+++ b/oval/p9/ALT-PU-2024-15473/tests.json
@@ -0,0 +1,138 @@
+{
+  "TextFileContent54Tests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:1001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "ALT Linux based on branch 'p9' must be installed",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:1001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:1001"
+      }
+    }
+  ],
+  "RPMInfoTests": [
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473001",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-doc-un is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473001"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473002",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-headers-modules-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473002"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473003",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-headers-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473003"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473004",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-domU-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473004"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473005",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-image-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473005"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473006",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473006"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473007",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473007"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473008",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-drm-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473008"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473009",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-ide-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473009"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    },
+    {
+      "ID": "oval:org.altlinux.errata:tst:202415473010",
+      "Version": "1",
+      "Check": "all",
+      "Comment": "kernel-modules-staging-un-def is earlier than 1:5.10.229-alt1",
+      "Object": {
+        "ObjectRef": "oval:org.altlinux.errata:obj:202415473010"
+      },
+      "State": {
+        "StateRef": "oval:org.altlinux.errata:ste:202415473001"
+      }
+    }
+  ]
+}
\ No newline at end of file