<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>Tuxcare Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2026-05-14T08:44:31</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759247594" version="1">
      <metadata>
        <title>Fix of 7 CVEs</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759247594" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1759247594" source="CLSA"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2019-17514" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-17514" source="CVE"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" source="CVE"/>
        <reference ref_id="CVE-2022-37454" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-37454" source="CVE"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" source="CVE"/>
        <description>* SECURITY UPDATE: DOS, buffer overflow in SHA3, Possible Bypass Blocklisting
     Redirection vulnerability in http.server, regex DOS, Quadratic complexity,
     pathname quoting for venv
     - debian/patches/CVE-2022-37454.patch: fix a buffer overflow in
       Modules/_sha3/kcp/KeccakSponge.inc, Lib/test/test_hashlib.py
       (LP: #1995197).
     - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
       in Lib/encodings/idna.py, Lib/test/test_codecs.py.
     - debian/patches/CVE-2023-24329.patch: enforce
       that a scheme must begin with an alphabetical ASCII character
       in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
       start stripping C0 control and space chars in `urlsplit`
     - debian/patches/CVE-2021-28861.patch: Fix an open
       redirection vulnerability in the `http.server` module
       when an URI path starts with `//`
     - debian/patches/CVE-2024-6232.patch: Fix header parsing vulnerability that
       could lead to ReDoS
     - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in parsing
       "-quoted cookie values with backslashes
     - debian/patches/CVE-2024-9287.patch: Quote template strings in `venv` activation
     - CVE-2022-37454
     - CVE-2022-45061
     - CVE-2023-24329
     - CVE-2021-28861
     - CVE-2024-6232
     - CVE-2024-7592
     - CVE-2024-9287</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-30"/>
          <updated date="2025-09-30"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-682" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-17514" impact="important" public="20191012">CVE-2019-17514</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-37454" impact="critical" public="20221021">CVE-2022-37454</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247594007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760114590" version="1">
      <metadata>
        <title>Fix of 8 CVEs</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760114590" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760114590" source="CLSA"/>
        <reference ref_id="CVE-2022-0391" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-0391" source="CVE"/>
        <reference ref_id="CVE-2022-48565" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48565" source="CVE"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2022-48560" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48560" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-24329" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-45061" source="CVE"/>
        <description>* SECURITY UPDATE: DoS in case of malicious XML entity declarations
     - debian/patches/CVE-2022-48565.patch: reject XML entity declarations
       in plist files
     - CVE-2022-48565
   * SECURITY UPDATE: Bypassing blocklisting methods by supplying a URL
     that starts with blank characters
     - debian/patches/CVE-2023-24329.patch,
       debian/patches/CVE-2023-24329-2.patch: prevent urllib.parse.urlparse
       from accepting schemes that don't begin with an alphabetical ASCII
       character
     - CVE-2023-24329
   * SECURITY UPDATE: ReDoS via specifically-crafted tar archives
     - debian/patches/CVE-2024-6232.patch: remove backtracking when parsing
       tarfile
     - CVE-2024-6232
   * SECURITY UPDATE: Excessive CPU usage while parsing a cookie value
     - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in
       parsing double-quoted cookie values with backslashes
     - CVE-2024-7592
   * SECURITY UPDATE: CPU DoS by crafting inputs to the IDNA decoder
     - debian/patches/CVE-2022-45061.patch: fix quadratic time idna
       decoding
     - CVE-2022-45061
   * SECURITY UPDATE: Use-after-free via heappushpop in heapq
     - debian/patches/CVE-2022-48560.patch: fix posible crash in heapq with
       custom comparison operators
     - debian/patches/CVE-2022-48560-2.patch: add tests for CVE-2022-48560
     - CVE-2022-48560
   * SECURITY UPDATE: DoS by HTTP client infinite line reading from
     malicious server after a 100 Continue response
     - debian/patches/CVE-2021-3737.patch: stop reading a header if it's
       too long
     - CVE-2021-3737
   * SECURITY UPDATE: A flaw in the urllib.parse module
     - debian/patches/CVE-2022-0391.patch: make urlparse sanitize URLs
       containing ASCII newline and tabs
     - CVE-2022-0391</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-10"/>
          <updated date="2025-10-10"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-0391" impact="important" public="20220209">CVE-2022-0391</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-611" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48565" impact="critical" public="20230822">CVE-2022-48565</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" impact="important" public="20200713">CVE-2019-20907</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48560" impact="important" public="20230822">CVE-2022-48560</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760114590008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760370001" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2020-26116, CVE-2020-8492</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760370001" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760370001" source="CLSA"/>
        <reference ref_id="CVE-2020-26116" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" source="CVE"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-8492" source="CVE"/>
        <description>* SECURITY UPDATE: DoS in regular expression because of
     urllib.request.AbstractBasicAuthHandler catastrophic backtracking
     - debian/patches/CVE-2020-8492.patch: fix DoS in the urllib regexp
     - CVE-2020-8492
   * SECURITY UPDATE: a header injection vulnerability for http methods
     in the httplib
     - debian/patches/CVE-2020-26116.patch: prevent header injection in
     http methods in httplib
     - CVE-2020-26116</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-13"/>
          <updated date="2025-10-13"/>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:P/A:N" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" impact="important" public="20200927">CVE-2020-26116</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-8492" impact="moderate" public="20200130">CVE-2020-8492</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760370001008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760706168" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760706168" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760706168" source="CLSA"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2022-48566" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48566" source="CVE"/>
        <reference ref_id="CVE-2021-23336" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-23336" source="CVE"/>
        <reference ref_id="CVE-2021-3733" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3733" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" source="CVE"/>
        <description>* SECURITY UPDATE: Web cache poisoning vulnerability
     - debian/patches/CVE-2021-23336.patch: fix web cache poisoning
       via urllib.parse.parse_qsl and urllib.parse.parse_qs
     - CVE-2021-23336
   * SECURITY UPDATE: Regular expression denial of service
     - debian/patches/CVE-2021-3733.patch: fix flaw in urllib’s
       AbstractBasicAuthHandler that could lead to a denial of service
       by leveraging a regular expression
     - CVE-2021-3733
   * SECURITY UPDATE: Constant-time-defeating optimisations issue
     - debian/patches/CVE-2022-48566.patch: make compare_digest more
       constant-time
     - CVE-2022-48566
   * SECURITY UPDATE: Incorrect parsing of email addresses containing special
     characters
     - debian/patches/CVE-2023-27043.patch: Fix email address parsing errors by
       adding optional 'strict' parameter to getaddresses() and parseaddr()
       functions
     - CVE-2023-27043
   * SECURITY UPDATE: TLS handshake bypass
     - debian/patches/CVE-2023-40217.patch: Check for &amp; avoid the ssl
       pre-close flaw. Update SSL tests
     - CVE-2023-40217</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-17"/>
          <updated date="2025-10-17"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48566" impact="moderate" public="20230822">CVE-2022-48566</cve>
          <cve cvss2="4.0/AV:N/AC:H/Au:N/C:N/I:P/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-23336" impact="moderate" public="20210215">CVE-2021-23336</cve>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3733" impact="moderate" public="20220310">CVE-2021-3733</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706168008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1762527200" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1762527200" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1762527200" source="CLSA"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517
   * TEST UPDATE: Incorrect encoding leading to an unexpected
     exception in test_tarfile.py
     - debian/patch/fix_test_tarfile-enconding.patch: fix encoding</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-07"/>
          <updated date="2025-11-07"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527200007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1764843244" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-9287</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1764843244" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1764843244" source="CLSA"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" source="CVE"/>
        <description>* SECURITY UPDATE: Command injection vulnerability in venv module activation
     scripts when virtual environment paths contain special shell characters
     - debian/patches/CVE-2024-9287.patch: Properly quote template
       strings in venv activation scripts</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-04"/>
          <updated date="2025-12-04"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843244007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1764872306" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-6232, CVE-2024-7592, CVE-2024-9287</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1764872306" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1764872306" source="CLSA"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" source="CVE"/>
        <description>* SECURITY UPDATE: ReDoS in tarfile module when parsing specially
     crafted tar archive headers
     - debian/patches/CVE-2024-6232.patch: Remove backtracking from
       tarfile header parsing
   * SECURITY UPDATE: DoS due to quadratic time complexity in http.cookies
     module when parsing quoted cookie values with backslashes
     - debian/patches/CVE-2024-7592.patch: Replace iterative regex search
       with single-pass substitution to eliminate quadratic complexity
   * SECURITY UPDATE: Command injection vulnerability in venv module activation
     scripts when virtual environment paths contain special shell characters
     - debian/patches/CVE-2024-9287.patch: Properly quote template
       strings in venv activation scripts</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-04"/>
          <updated date="2025-12-04"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872306007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1765794155" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-6597</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1765794155" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1765794155" source="CLSA"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" source="CVE"/>
        <description>* SECURITY UPDATE: Ability to modify permissions with privileged programs
     - debian/patches/CVE-2023-6597: prevent tempfile.TemporaryDirectory
       class dereference symlinks
     - CVE-2023-6597</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-15"/>
          <updated date="2025-12-15"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765794155007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1766142702" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-6597</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1766142702" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1766142702" source="CLSA"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" source="CVE"/>
        <description>* SECURITY UPDATE: Ability to modify permissions with privileged programs
     - debian/patches/CVE-2023-6597.patch: prevent tempfile.TemporaryDirectory
       class dereference symlinks
     - CVE-2023-6597</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-19"/>
          <updated date="2025-12-19"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142702007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1767089506" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-27043, CVE-2023-40217</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2025:1767089506" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1767089506" source="CLSA"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" source="CVE"/>
        <description>* SECURITY UPDATE: Bypass of domain e-mail-based protection mechanism by
     incorrect parsing of e-mail addresses that contain a special character
     - debian/patches/CVE-2023-27043.patch: reject malformed addresses in
       email.parseaddr()
     - CVE-2023-27043
   * SECURITY UPDATE: Bypass of the TLS handshake and included protections
     - debian/patches/CVE-2023-40217.patch: check for &amp; avoid the ssl
       pre-close flaw
     - CVE-2023-40217</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-30"/>
          <updated date="2025-12-30"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089506007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768554926" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768554926" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768554926" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554926007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768569306" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768569306" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768569306" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569306007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768570830" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2007-4559, CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768570830" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768570830" source="CLSA"/>
        <reference ref_id="CVE-2007-4559" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2007-4559" source="CVE"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084
   * SECURITY UPDATE: Overwriting of arbitrary files by remote attackers
     - debian/patches/CVE-2007-4559.patch: implement PEP 706 - a filter in
       the tarfile module to prevent directory traversal vulnerability
     - CVE-2007-4559</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2007-4559" impact="moderate" public="20070828">CVE-2007-4559</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768570830007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768588081" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084, CVE-2025-13836</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768588081" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768588081" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <reference ref_id="CVE-2025-13836" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13836" source="CVE"/>
        <description>* SECURITY UPDATE: Potential denial of service in http.client
     - debian/patches/CVE-2025-13836.patch: Read large data by
       chunks instead of allocating memory based on Content-Length
     - CVE-2025-13836
   * SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: Remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13836" impact="critical" public="20251201">CVE-2025-13836</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588081007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771328334" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771328334" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771328334" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771328334007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771328555" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771328555" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771328555" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328555007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771329219" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771329219" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771329219" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329219007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771343841" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771343841" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771343841" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343841007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771868543" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2015-20107</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771868543" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771868543" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>* SECURITY UPDATE: Shell command injection in mailcap module
     - debian/patches/CVE-2015-20107.patch: sanitize the second
       argument which allowing shell commands injection
     - CVE-2015-20107</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-23"/>
          <updated date="2026-02-23"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771868543008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771870569" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771870569" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771870569" source="CLSA"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-23"/>
          <updated date="2026-02-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870569007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772022990" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772022990" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772022990" source="CLSA"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-25"/>
          <updated date="2026-02-25"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772022990007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772099557" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2015-20107</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772099557" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772099557" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>* SECURITY UPDATE: Shell command injection in the mailcap module
     - debian/patches/CVE-2015-20107.patch: sanitize the second
       argument which allowing shell command injection
     - CVE-2015-20107</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099557007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772109117" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772109117" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772109117" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109117008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772210148" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772210148" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772210148" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-27"/>
          <updated date="2026-02-27"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772210148007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772445041" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772445041" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772445041" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772445041007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772446925" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772446925" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772446925" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772446925007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772618500" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772618500" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772618500" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-04"/>
          <updated date="2026-03-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772618500007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772618757" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772618757" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772618757" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-04"/>
          <updated date="2026-03-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618757007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772620885" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772620885" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772620885" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-04"/>
          <updated date="2026-03-04"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772620885007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772700406" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772700406" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772700406" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700406008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772702370" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772702370" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772702370" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702370007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772710355" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772710355" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772710355" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772710355007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773221837" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773221837" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1773221837" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: replace character-by-character loop
       with regex-based substitution to fix quadratic complexity
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-11"/>
          <updated date="2026-03-11"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773221837008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1774960070" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1774960070" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1774960070" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-31"/>
          <updated date="2026-03-31"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39-setuptools is earlier than 58.3.0-2" test_ref="oval:com.tuxcare.clsa:tst:1774960070001"/>
        <criterion comment="alt-python39-setuptools-wheel is earlier than 58.3.0-2" test_ref="oval:com.tuxcare.clsa:tst:1774960070002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776158342" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776158342" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158342" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-14"/>
          <updated date="2026-04-14"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36-setuptools is earlier than 38.5.2-10" test_ref="oval:com.tuxcare.clsa:tst:1776158342001"/>
        <criterion comment="alt-python36-setuptools-wheel is earlier than 38.5.2-10" test_ref="oval:com.tuxcare.clsa:tst:1776158342002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776158822" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776158822" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-14"/>
          <updated date="2026-04-14"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38-setuptools is earlier than 58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776158822001"/>
        <criterion comment="alt-python38-setuptools-wheel is earlier than 58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776158822002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776324642" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776324642" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776324642" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-16"/>
          <updated date="2026-04-16"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37-setuptools is earlier than 58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776324642001"/>
        <criterion comment="alt-python37-setuptools-wheel is earlier than 58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776324642002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776417525" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776417525" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776417525" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: webbrowser.open() allows command-line option injection
     via URLs with leading dashes
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection in
       browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417525007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776419446" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776419446" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776419446" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419446008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776420546" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776420546" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776420546" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420546007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776425678" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776425678" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776425678" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: webbrowser.open() accepts leading dashes in URLs which
     could be interpreted as command-line options by web browsers
     - debian/patches/CVE-2026-4519.patch: reject URLs starting with dashes
       in BaseBrowser._check_url() before passing to subprocess
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425678007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776936971" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776936971" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776936971" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: Command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-23"/>
          <updated date="2026-04-23"/>
          <cve cvss3="0.0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="important" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-15" test_ref="oval:com.tuxcare.clsa:tst:1776936971007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777384337" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-6100</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777384337" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777384337" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <description>* SECURITY UPDATE: use-after-free in lzma/bz2/gzip decompressors
     - debian/patches/CVE-2026-6100.patch: null next_in at the error:
       label of decompress() in Modules/_bz2module.c and
       Modules/_lzmamodule.c so the decompressor cannot be re-used
       with a stale buffer pointer after a MemoryError.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-28"/>
          <updated date="2026-04-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-11" test_ref="oval:com.tuxcare.clsa:tst:1777384337007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777384860" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-0450, CVE-2026-6100</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777384860" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777384860" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <description>* SECURITY UPDATE: zipfile quoted-overlap zip bomb
     - debian/patches/CVE-2024-0450.patch: raise BadZipFile when an
       archive entry overlaps with another entry or the central
       directory, preventing quoted-overlap zip bombs with extreme
       compression ratios.
     - CVE-2024-0450
   * SECURITY UPDATE: use-after-free in lzma/bz2 decompressors
     - debian/patches/CVE-2026-6100.patch: null next_in at the error:
       label of decompress() in Modules/_bz2module.c and
       Modules/_lzmamodule.c so the decompressor cannot be re-used
       with a stale buffer pointer after a MemoryError.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-28"/>
          <updated date="2026-04-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-30" test_ref="oval:com.tuxcare.clsa:tst:1777384860007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777396247" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-0450, CVE-2026-6100</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777396247" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777396247" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <description>* SECURITY UPDATE: zipfile quoted-overlap zip bomb
     - debian/patches/CVE-2024-0450.patch: raise BadZipFile when an
       archive entry overlaps with another entry or the central
       directory, preventing quoted-overlap zip bombs with extreme
       compression ratios.
     - CVE-2024-0450
   * SECURITY UPDATE: use-after-free in lzma/bz2 decompressors
     - debian/patches/CVE-2026-6100.patch: null next_in at the error:
       label of decompress() in Modules/_bz2module.c and
       Modules/_lzmamodule.c so the decompressor cannot be re-used
       with a stale buffer pointer after a MemoryError.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-28"/>
          <updated date="2026-04-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-16" test_ref="oval:com.tuxcare.clsa:tst:1777396247007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777409949" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-6100</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777409949" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777409949" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <description>* SECURITY UPDATE: use-after-free in lzma/bz2/gzip decompressors
     - debian/patches/CVE-2026-6100.patch: null next_in at the error:
       label of decompress() in Modules/_bz2module.c and
       Modules/_lzmamodule.c so the decompressor cannot be re-used
       with a stale buffer pointer after a MemoryError.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-28"/>
          <updated date="2026-04-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-13" test_ref="oval:com.tuxcare.clsa:tst:1777409949007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777530671" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-6100</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777530671" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777530671" source="CLSA"/>
        <reference ref_id="CVE-2026-6100" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" source="CVE"/>
        <reference ref_id="CVE-2020-27619" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-27619" source="CVE"/>
        <reference ref_id="CVE-2024-0450" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" source="CVE"/>
        <reference ref_id="CVE-2021-3177" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3177" source="CVE"/>
        <reference ref_id="CVE-2021-4189" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-4189" source="CVE"/>
        <description>* SECURITY UPDATE: use-after-free in
     BZ2Decompressor when MemoryError is raised in the C-level
     decompress() helper
     - debian/patches/CVE-2026-6100.patch: defensively null
       bzs-&gt;next_in on the error: path of BZ2Decomp_decompress in
       Modules/bz2module.c.
     - CVE-2026-6100</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-30"/>
          <updated date="2026-04-30"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-6100" impact="critical" public="20260413">CVE-2026-6100</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-27619" impact="critical" public="20201022">CVE-2020-27619</cve>
          <cve cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-450" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0450" impact="moderate" public="20240319">CVE-2024-0450</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3177" impact="critical" public="20210119">CVE-2021-3177</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-252" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-4189" impact="moderate" public="20220824">CVE-2021-4189</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-16" test_ref="oval:com.tuxcare.clsa:tst:1777530671008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777625845" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2021-28861, CVE-2024-0397, CVE-2024-6923, CVE-2026-1299</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777625845" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777625845" source="CLSA"/>
        <reference ref_id="CVE-2024-6923" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6923" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-28861" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: header injection via newline in email.Generator
     - debian/patches/CVE-2026-1299.patch: add HeaderWriteError exception
       to Lib/email/errors.py, add NEWLINE_WITHOUT_FWSP regex to
       Lib/email/generator.py and check the header *value* in all four
       branches of Generator._write_headers(), raising HeaderWriteError
       when a CR/LF without folding whitespace is found. Updates
       test_embedded_header_via_string_rejected to expect
       HeaderWriteError instead of HeaderParseError. In Python 2.7 this
       single Generator-class hardening covers both upstream
       CVE-2026-1299 (BytesGenerator) and CVE-2024-6923 because
       BytesGenerator does not exist in 2.7.
     - CVE-2026-1299
   * SECURITY UPDATE: missing header-name newline check in email.Generator
     - debian/patches/CVE-2024-6923.patch: add NEWLINE_WITHOUT_FWSP check
       on the header *name* at the top of Generator._write_headers() in
       Lib/email/generator.py, raising HeaderWriteError when a CR/LF
       without folding whitespace is found in the header name. Documents
       HeaderWriteError in Doc/library/email.errors.rst and adds a
       test_invalid_header_format regression test in
       Lib/email/test/test_email_renamed.py.
     - CVE-2024-6923
   * SECURITY UPDATE: ssl.SSLContext data race in cert_store_stats /
     get_ca_certs
     - debian/patches/CVE-2024-0397.patch: backport of upstream 3.8
       commit 29c97287d2 ("[3.8] gh-114572: Fix locking in
       cert_store_stats and get_ca_certs"). Adds a polyfill of
       OpenSSL 3.3's X509_STORE_get1_objects() (deep-copy under
       X509_STORE_lock()) and replaces the shared, unlocked
       X509_STORE_get0_objects() calls in cert_store_stats() and
       get_ca_certs() in Modules/_ssl.c, preventing a memory race
       and potential use-after-free when an SSLContext is shared
       across multiple threads.
     - CVE-2024-0397
   * SECURITY UPDATE: open redirect in BaseHTTPServer when path starts
     with //
     - debian/patches/CVE-2021-28861.patch: backport of upstream commit
       4abab6b603 ("gh-87389: Fix an open redirection vulnerability in
       http.server"). In Lib/BaseHTTPServer.py, after the request line
       is parsed, collapse any leading run of '/' characters to a
       single '/' so an attacker-controlled '//evil.example/...' path
       cannot become an absolute scheme-less URI in a 301 Location
       header. Adds a regression test in Lib/test/test_httpservers.py.
     - CVE-2021-28861</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6923" impact="moderate" public="20240801">CVE-2024-6923</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-17" test_ref="oval:com.tuxcare.clsa:tst:1777625845008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777626253" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-0397, CVE-2024-4032, CVE-2024-6923, CVE-2026-1299</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777626253" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777626253" source="CLSA"/>
        <reference ref_id="CVE-2024-4032" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: email BytesGenerator header injection
     - debian/patches/CVE-2026-1299.patch: combined backport of
       gh-121650 (CVE-2024-6923) and gh-144125 (CVE-2026-1299) that
       adds email.errors.HeaderWriteError, the
       policy.verify_generated_headers attribute, and the
       verify-on-write check for both Generator and BytesGenerator,
       preventing CRLF/LF header injection through custom fold().
     - CVE-2026-1299
   * SECURITY UPDATE: ssl.SSLContext memory race in cert_store_stats /
     get_ca_certs
     - debian/patches/CVE-2024-0397.patch: backport the
       X509_STORE_get1_objects shim and the x509_object_dup helper from
       cpython 3.8.20 (29c97287d2). The two affected impl functions in
       Modules/_ssl.c (cert_store_stats / get_ca_certs) now take a
       deep-copy snapshot of the X509_STORE under X509_STORE_lock(),
       preventing the use-after-free that occurred when certificates
       were loaded concurrently from another thread.
     - CVE-2024-0397
   * SECURITY UPDATE: ipaddress is_private/is_global misclassification
     - debian/patches/CVE-2024-4032.patch: backport cpython 3.8.20 fix
       895f7e2ac2 (gh-113171). Adds the
       _IPv4Constants._private_networks_exceptions list (192.0.0.9/32,
       192.0.0.10/32) and the IPv6 equivalents (2001:1::1/128,
       2001:1::2/128, 2001:3::/32, 2001:4:112::/48, 2001:20::/28,
       2001:30::/28). Expands 192.0.0.0/29 to /24, adds 64:ff9b:1::/48
       and 2002::/16 to the IPv6 _private_networks list, and updates
       is_private to filter against the exceptions list and use
       ipv4_mapped semantics on IPv6.
     - CVE-2024-4032</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-440" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" impact="important" public="20240617">CVE-2024-4032</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-17" test_ref="oval:com.tuxcare.clsa:tst:1777626253007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777635366" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-0397, CVE-2024-4032, CVE-2024-6923, CVE-2026-1299</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777635366" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777635366" source="CLSA"/>
        <reference ref_id="CVE-2024-4032" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" source="CVE"/>
        <reference ref_id="CVE-2024-0397" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" source="CVE"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: email BytesGenerator header injection
     - debian/patches/CVE-2026-1299.patch: verify generated headers in
       email.generator.BytesGenerator and Generator. Adds the
       HeaderWriteError exception, NEWLINE_WITHOUT_FWSP /
       NEWLINE_WITHOUT_FWSP_BYTES regexes, and the
       Policy.verify_generated_headers attribute, then raises
       HeaderWriteError when the folded header does not end with the
       policy linesep or contains a stray newline. Includes the
       CVE-2024-6923 prerequisite hardening of the string Generator.
     - CVE-2026-1299
   * SECURITY UPDATE: ssl.SSLContext memory race in cert_store_stats /
     get_ca_certs
     - debian/patches/CVE-2024-0397.patch: backport the upstream
       X509_STORE_get1_objects shim and the x509_object_dup helper
       from cpython 29c97287d205bf2f410f4895ebce3f43b5160524, then
       switch _ssl__SSLContext_cert_store_stats_impl and
       _ssl__SSLContext_get_ca_certs_impl to take a deep-copy snapshot
       of the X509_STORE under lock, freeing the snapshot before
       returning. Closes a use-after-free triggered by loading
       certificates concurrently from another thread.
     - CVE-2024-0397
   * SECURITY UPDATE: ipaddress is_private / is_global misclassification
     - debian/patches/CVE-2024-4032.patch: backport upstream
       gh-113171 / gh-65056. Update Lib/ipaddress.py to align the
       _private_networks lists with the IANA special-purpose registries
       and add _private_networks_exceptions so that
       is_private / is_global no longer misclassify addresses in
       192.0.0.0/24 (with 192.0.0.9 and 192.0.0.10 exceptions),
       64:ff9b:1::/48, 2002::/16, and the 2001::/23 sub-range
       exceptions (2001:1::1, 2001:1::2, 2001:3::/32, 2001:4:112::/48,
       2001:20::/28, 2001:30::/28). Includes the matching docs and
       test updates.
     - CVE-2024-4032</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-440" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-4032" impact="important" public="20240617">CVE-2024-4032</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-0397" impact="important" public="20240617">CVE-2024-0397</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-31" test_ref="oval:com.tuxcare.clsa:tst:1777635366007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777646657" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-6923, CVE-2026-1299</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777646657" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777646657" source="CLSA"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: email.BytesGenerator did not quote newlines in
     serialized headers, allowing header injection when a custom header
     class (e.g. LiteralHeader) bypasses the email folding rules. This is
     a bypass of CVE-2024-6923, which only added the validation to the
     text Generator class.
     - debian/patches/CVE-2026-1299.patch: mirror the
       verify_generated_headers / NEWLINE_WITHOUT_FWSP check from
       Generator._write_headers into BytesGenerator._write_headers in
       Lib/email/generator.py, raising HeaderWriteError on unsafely
       folded or delimited headers; extend test_email tests to cover
       message.as_bytes().
     - CVE-2026-1299</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-01"/>
          <updated date="2026-05-01"/>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-12" test_ref="oval:com.tuxcare.clsa:tst:1777646657007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1777913601" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-1299</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1777913601" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1777913601" source="CLSA"/>
        <reference ref_id="CVE-2026-1299" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" source="CVE"/>
        <description>* SECURITY UPDATE: email.generator.BytesGenerator does not validate folded
     headers, allowing header injection via crafted Header subclasses
     - debian/patches/CVE-2026-1299.patch: extend verify_generated_headers
       check to BytesGenerator._write_headers() in Lib/email/generator.py
       so unsafely folded or delimited headers raise HeaderWriteError on
       as_bytes() too. Adds matching test coverage in
       Lib/test/test_email/test_generator.py and test_policy.py.
     - CVE-2026-1299</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-04"/>
          <updated date="2026-05-04"/>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-1299" impact="important" public="20260123">CVE-2026-1299</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-14" test_ref="oval:com.tuxcare.clsa:tst:1777913601007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778146199" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778146199" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778146199" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64_impl no longer breaks out on a pad
       sequence; a `pads` counter is added so post-loop validation still
       raises "Incorrect padding" / "Invalid base64-encoded string" for
       inputs that do not satisfy `quad_pos + pads == 4`. The unused
       `binascii_find_valid` helper is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199001"/>
        <criterion comment="alt-python38-debug is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199002"/>
        <criterion comment="alt-python38-devel is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199003"/>
        <criterion comment="alt-python38-idle is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199004"/>
        <criterion comment="alt-python38-libs is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199005"/>
        <criterion comment="alt-python38-test is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199006"/>
        <criterion comment="alt-python38-tkinter is earlier than 3.8.20-15" test_ref="oval:com.tuxcare.clsa:tst:1778146199007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778148441" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778148441" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778148441" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64_impl no longer breaks out on a pad
       sequence; a `pads` counter tracks them so post-loop validation
       still raises "Incorrect padding" / "Invalid base64-encoded string"
       for inputs that do not satisfy `quad_pos + pads == 4`. The unused
       `done:` label is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-13" test_ref="oval:com.tuxcare.clsa:tst:1778148441007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778163919" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778163919" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778163919" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64 no longer breaks out on a pad
       sequence; a `pads` counter is added so post-loop validation still
       raises "Incorrect padding" for inputs that do not satisfy
       `quad_pos + pads == 4`. The unused `binascii_find_valid` helper
       is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919001"/>
        <criterion comment="alt-python27-debug is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919002"/>
        <criterion comment="alt-python27-devel is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919003"/>
        <criterion comment="alt-python27-idle is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919004"/>
        <criterion comment="alt-python27-libs is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919005"/>
        <criterion comment="alt-python27-test is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919006"/>
        <criterion comment="alt-python27-tkinter is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919007"/>
        <criterion comment="alt-python27-tools is earlier than 2.7.18-18" test_ref="oval:com.tuxcare.clsa:tst:1778163919008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778192926" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778192926" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778192926" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64_impl no longer breaks out on a pad
       sequence; a `pads` counter is added so post-loop validation still
       raises "Incorrect padding" for inputs that do not satisfy
       `quad_pos + pads == 4`. The unused `binascii_find_valid` helper
       is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-07"/>
          <updated date="2026-05-07"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926001"/>
        <criterion comment="alt-python36-debug is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926002"/>
        <criterion comment="alt-python36-devel is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926003"/>
        <criterion comment="alt-python36-libs is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926004"/>
        <criterion comment="alt-python36-test is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926005"/>
        <criterion comment="alt-python36-tkinter is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926006"/>
        <criterion comment="alt-python36-tools is earlier than 3.6.15-32" test_ref="oval:com.tuxcare.clsa:tst:1778192926007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778612981" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-3446</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778612981" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778612981" source="CLSA"/>
        <reference ref_id="CVE-2026-3446" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" source="CVE"/>
        <description>* SECURITY UPDATE: binascii.a2b_base64 / base64.b64decode stop decoding
     after the first padded quad, silently dropping any excess data. The
     behaviour can lead to data being accepted that other implementations
     process differently.
     - debian/patches/CVE-2026-3446.patch: backport of upstream commits
       4561f6418a (main), e31c55121620 (3.14), 1f9958f909c1 (3.13). Treats
       the pad character as non-alphabet data per RFC 4648 section 3.3:
       the loop in binascii_a2b_base64_impl no longer breaks out on a pad
       sequence; a `pads` counter is added so post-loop validation still
       raises "Incorrect padding" / "Invalid base64-encoded string" for
       inputs that do not satisfy `quad_pos + pads == 4`. The unused
       `binascii_find_valid` helper is removed.
     - CVE-2026-3446</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-12"/>
          <updated date="2026-05-12"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-1286" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3446" impact="moderate" public="20260410">CVE-2026-3446</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981001"/>
        <criterion comment="alt-python37-debug is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981002"/>
        <criterion comment="alt-python37-devel is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981003"/>
        <criterion comment="alt-python37-libs is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981004"/>
        <criterion comment="alt-python37-test is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981005"/>
        <criterion comment="alt-python37-tkinter is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981006"/>
        <criterion comment="alt-python37-tools is earlier than 3.7.17-18" test_ref="oval:com.tuxcare.clsa:tst:1778612981007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1778747065" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-15282, CVE-2026-0672, CVE-2026-3644, CVE-2026-4224</title>
        <affected family="unix">
          <platform>Debian 13</platform>
        </affected>
        <reference ref_id="CLSA-2026:1778747065" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1778747065" source="CLSA"/>
        <reference ref_id="CVE-2025-15282" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-15282" source="CVE"/>
        <reference ref_id="CVE-2026-3644" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3644" source="CVE"/>
        <reference ref_id="CVE-2026-4224" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4224" source="CVE"/>
        <reference ref_id="CVE-2026-0672" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-0672" source="CVE"/>
        <description>* SECURITY UPDATE: urllib.request.DataHandler accepted data: URLs whose
     mediatype contained control characters, allowing newline-based HTTP
     header injection downstream.
     - debian/patches/CVE-2025-15282.patch: backport of cpython
       f25509e78e (gh-143925, Seth Larson). Adds a [\\x00-\\x1F\\x7F]
       regex check in data_open() and a matching test_invalid_mediatype.
     - CVE-2025-15282
   * SECURITY UPDATE: http.cookies.Morsel did not reject control characters
     in keys / values / coded_value, allowing cookie injection via
     __setitem__, setdefault, set, and BaseCookie.output.
     - debian/patches/CVE-2026-0672.patch: backport of cpython
       95746b3a13 (gh-143919, Seth Larson). Adds _has_control_character
       helper and inserts validation in __setitem__, setdefault, set,
       plus a wrap of BaseCookie.OutputString / output.
     - CVE-2026-0672
   * SECURITY UPDATE: the CVE-2026-0672 fix was incomplete; control
     characters could still bypass via Morsel.update(), |=, __setstate__
     (pickle), and BaseCookie.js_output().
     - debian/patches/CVE-2026-3644.patch: backport of cpython
       57e88c1cf9 (gh-145599, Stan Ulbrych + Victor Stinner). Adds
       validation to Morsel.update(), defines explicit Morsel.__ior__
       (was inherited from dict and bypassed validation), validates
       __setstate__ before assigning attributes, and re-validates the
       assembled output string in js_output().
     - CVE-2026-3644
   * SECURITY UPDATE: Modules/pyexpat.c conv_content_model could overflow
     the C stack when an Expat parser with a registered ElementDeclHandler
     parsed a deeply nested DTD content model, causing a denial-of-service.
     - debian/patches/CVE-2026-4224.patch: backport of cpython
       eb0e8be3a7 (gh-145986, Stan Ulbrych + Bénédikt Tran). Wraps
       conv_content_model with Py_EnterRecursiveCall / Py_LeaveRecursiveCall
       so deep nesting raises RecursionError instead of crashing.
     - CVE-2026-4224</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-05-14"/>
          <updated date="2026-05-14"/>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-15282" impact="moderate" public="20260120">CVE-2025-15282</cve>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-791" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-3644" impact="moderate" public="20260316">CVE-2026-3644</cve>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-805" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4224" impact="moderate" public="20260316">CVE-2026-4224</cve>
          <cve cvss3="6.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" cwe="CWE-93" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-0672" impact="moderate" public="20260120">CVE-2026-0672</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065001"/>
        <criterion comment="alt-python39-debug is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065002"/>
        <criterion comment="alt-python39-devel is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065003"/>
        <criterion comment="alt-python39-idle is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065004"/>
        <criterion comment="alt-python39-libs is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065005"/>
        <criterion comment="alt-python39-test is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065006"/>
        <criterion comment="alt-python39-tkinter is earlier than 3.9.23-14" test_ref="oval:com.tuxcare.clsa:tst:1778747065007"/>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247594007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759247594001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760114590008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760114590001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760370001008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760370001001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706168008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760706168001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527200007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762527200001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843244007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764843244001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872306007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1764872306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765794155007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1765794155001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142702007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1766142702001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089506007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767089506001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554926007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768554926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569306007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768569306001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768570830007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768570830001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588081007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768588081001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771328334007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328334001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328555007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771328555001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329219007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771329219001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343841007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771343841001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771868543008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771868543001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870569007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771870569001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772022990007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772022990001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099557007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772099557001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109117008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772109117001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772210148007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772210148001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772445041007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772445041001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772446925007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772446925001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772618500007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618500001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618757007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772618757001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772620885007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772620885001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700406008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772700406001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702370007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772702370001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772710355007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772710355001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773221837008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773221837001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-setuptools is earlier than 58.3.0-2" id="oval:com.tuxcare.clsa:tst:1774960070001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1774960070001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774960070001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-setuptools-wheel is earlier than 58.3.0-2" id="oval:com.tuxcare.clsa:tst:1774960070002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1774960070002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774960070001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-setuptools is earlier than 38.5.2-10" id="oval:com.tuxcare.clsa:tst:1776158342001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1776158342001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776158342001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-setuptools-wheel is earlier than 38.5.2-10" id="oval:com.tuxcare.clsa:tst:1776158342002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1776158342002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776158342001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-setuptools is earlier than 58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776158822001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1776158822001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776158822001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-setuptools-wheel is earlier than 58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776158822002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1776158822002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776158822001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-setuptools is earlier than 58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776324642001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1776324642001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776158822001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-setuptools-wheel is earlier than 58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776324642002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1776324642002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776158822001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417525007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776417525001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419446008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776419446001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420546007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776420546001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425678007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776425678001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-15" id="oval:com.tuxcare.clsa:tst:1776936971007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1776936971001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-11" id="oval:com.tuxcare.clsa:tst:1777384337007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384337001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-30" id="oval:com.tuxcare.clsa:tst:1777384860007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777384860001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-16" id="oval:com.tuxcare.clsa:tst:1777396247007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777396247001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-13" id="oval:com.tuxcare.clsa:tst:1777409949007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777409949001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-16" id="oval:com.tuxcare.clsa:tst:1777530671008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777530671001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-17" id="oval:com.tuxcare.clsa:tst:1777625845008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777625845001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-17" id="oval:com.tuxcare.clsa:tst:1777626253007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777626253001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-31" id="oval:com.tuxcare.clsa:tst:1777635366007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777635366001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-12" id="oval:com.tuxcare.clsa:tst:1777646657007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777646657001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-14" id="oval:com.tuxcare.clsa:tst:1777913601007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1777913601001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 3.8.20-15" id="oval:com.tuxcare.clsa:tst:1778146199007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764843244007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778146199001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-13" id="oval:com.tuxcare.clsa:tst:1778148441007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778148441001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 2.7.18-18" id="oval:com.tuxcare.clsa:tst:1778163919008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1760114590008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778163919001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 3.6.15-32" id="oval:com.tuxcare.clsa:tst:1778192926007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1759247594007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778192926001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 3.7.17-18" id="oval:com.tuxcare.clsa:tst:1778612981007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1764872306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778612981001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306006"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
    <red-def:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 3.9.23-14" id="oval:com.tuxcare.clsa:tst:1778747065007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1768569306007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1778747065001"/>
    </red-def:dpkginfo_test>
  </tests>
  <objects>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594001" version="1">
      <red-def:name>alt-python36</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594002" version="1">
      <red-def:name>alt-python36-debug</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594003" version="1">
      <red-def:name>alt-python36-devel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594004" version="1">
      <red-def:name>alt-python36-libs</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594005" version="1">
      <red-def:name>alt-python36-test</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594006" version="1">
      <red-def:name>alt-python36-tkinter</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247594007" version="1">
      <red-def:name>alt-python36-tools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590001" version="1">
      <red-def:name>alt-python27</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590002" version="1">
      <red-def:name>alt-python27-debug</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590003" version="1">
      <red-def:name>alt-python27-devel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590004" version="1">
      <red-def:name>alt-python27-idle</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590005" version="1">
      <red-def:name>alt-python27-libs</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590006" version="1">
      <red-def:name>alt-python27-test</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590007" version="1">
      <red-def:name>alt-python27-tkinter</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1760114590008" version="1">
      <red-def:name>alt-python27-tools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244001" version="1">
      <red-def:name>alt-python38</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244002" version="1">
      <red-def:name>alt-python38-debug</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244003" version="1">
      <red-def:name>alt-python38-devel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244004" version="1">
      <red-def:name>alt-python38-idle</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244005" version="1">
      <red-def:name>alt-python38-libs</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244006" version="1">
      <red-def:name>alt-python38-test</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843244007" version="1">
      <red-def:name>alt-python38-tkinter</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306001" version="1">
      <red-def:name>alt-python37</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306002" version="1">
      <red-def:name>alt-python37-debug</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306003" version="1">
      <red-def:name>alt-python37-devel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306004" version="1">
      <red-def:name>alt-python37-libs</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306005" version="1">
      <red-def:name>alt-python37-test</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306006" version="1">
      <red-def:name>alt-python37-tkinter</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872306007" version="1">
      <red-def:name>alt-python37-tools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306001" version="1">
      <red-def:name>alt-python39</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306002" version="1">
      <red-def:name>alt-python39-debug</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306003" version="1">
      <red-def:name>alt-python39-devel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306004" version="1">
      <red-def:name>alt-python39-idle</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306005" version="1">
      <red-def:name>alt-python39-libs</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306006" version="1">
      <red-def:name>alt-python39-test</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569306007" version="1">
      <red-def:name>alt-python39-tkinter</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1774960070001" version="1">
      <red-def:name>alt-python39-setuptools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1774960070002" version="1">
      <red-def:name>alt-python39-setuptools-wheel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776158342001" version="1">
      <red-def:name>alt-python36-setuptools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776158342002" version="1">
      <red-def:name>alt-python36-setuptools-wheel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776158822001" version="1">
      <red-def:name>alt-python38-setuptools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776158822002" version="1">
      <red-def:name>alt-python38-setuptools-wheel</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776324642001" version="1">
      <red-def:name>alt-python37-setuptools</red-def:name>
    </red-def:dpkginfo_object>
    <red-def:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776324642002" version="1">
      <red-def:name>alt-python37-setuptools-wheel</red-def:name>
    </red-def:dpkginfo_object>
  </objects>
  <states>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1759247594001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-14</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760114590001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-6</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760370001001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-7</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760706168001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-8</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1762527200001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-19</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1764843244001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-4</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1764872306001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-5</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1765794155001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-20</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1766142702001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-6</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1767089506001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-7</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768554926001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-21</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768569306001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-4</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768570830001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-8</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768588081001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-5</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771328334001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-23</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771328555001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-7</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771329219001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-10</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771343841001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-6</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771868543001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-9</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771870569001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-11</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772022990001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-8</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772099557001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-25</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772109117001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-10</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772210148001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-8</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772445041001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-27</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772446925001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-13</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772618500001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-28</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772618757001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-14</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772620885001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-10</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772700406001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-11</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772702370001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-11</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772710355001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-9</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1773221837001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-12</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1774960070001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">58.3.0-2</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776158342001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">38.5.2-10</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776158822001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">58.3.0-3</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776417525001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-12</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776419446001" version="1">
      <red-def:arch datatype="string" operation="equals">amd64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-14</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776420546001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-29</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776425678001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-10</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776936971001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-15</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777384337001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-11</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777384860001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-30</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777396247001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-16</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777409949001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-13</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777530671001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-16</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777625845001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-17</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777626253001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-17</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777635366001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-31</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777646657001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-12</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1777913601001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-14</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778146199001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.8.20-15</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778148441001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-13</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778163919001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2.7.18-18</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778192926001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.6.15-32</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778612981001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.7.17-18</red-def:evr>
    </red-def:dpkginfo_state>
    <red-def:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1778747065001" version="1">
      <red-def:arch datatype="string" operation="pattern match">amd64|arm64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3.9.23-14</red-def:evr>
    </red-def:dpkginfo_state>
  </states>
</oval_definitions>
