<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:linux="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>Tuxcare Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2026-04-17T11:30:52</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759247489" version="1">
      <metadata>
        <title>Fix of 7 CVEs</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759247489" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1759247489" source="CLSA"/>
        <reference ref_id="CVE-2019-17514" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-17514" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" source="CVE"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2022-37454" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-37454" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" source="CVE"/>
        <description>* SECURITY UPDATE: DOS, buffer overflow in SHA3, Possible Bypass Blocklisting
     Redirection vulnerability in http.server, regex DOS, Quadratic complexity,
     pathname quoting for venv
     - debian/patches/CVE-2022-37454.patch: fix a buffer overflow in
       Modules/_sha3/kcp/KeccakSponge.inc, Lib/test/test_hashlib.py
       (LP: #1995197).
     - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
       in Lib/encodings/idna.py, Lib/test/test_codecs.py.
     - debian/patches/CVE-2023-24329.patch: enforce
       that a scheme must begin with an alphabetical ASCII character
       in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
       start stripping C0 control and space chars in `urlsplit`
     - debian/patches/CVE-2021-28861.patch: Fix an open
       redirection vulnerability in the `http.server` module
       when an URI path starts with `//`
     - debian/patches/CVE-2024-6232.patch: Fix header parsing vulnerability that
       could lead to ReDoS
     - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in parsing
       "-quoted cookie values with backslashes
     - debian/patches/CVE-2024-9287.patch: Quote template strings in `venv` activation
     - CVE-2022-37454
     - CVE-2022-45061
     - CVE-2023-24329
     - CVE-2021-28861
     - CVE-2024-6232
     - CVE-2024-7592
     - CVE-2024-9287</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-30"/>
          <updated date="2025-09-30"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-682" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-17514" impact="important" public="20191012">CVE-2019-17514</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-37454" impact="critical" public="20221021">CVE-2022-37454</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-14" test_ref="oval:com.tuxcare.clsa:tst:1759247489007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759510002" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2019-20907, CVE-2019-9674</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759510002" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1759510002" source="CLSA"/>
        <reference ref_id="CVE-2019-9674" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" source="CVE"/>
        <description>* SECURITY UPDATE: zip bomb vulnerability in Lib/zipfile.py
     - debian/patches/CVE-2019-9674.patch: add pitfalls to zipfile module
       documentation
     - CVE-2019-9674
   * SECURITY UPDATE: Infinite loop
     - debian/patches/CVE-2019-20907.patch: avoid infinite loop in the
       tarfile module in Lib/tarfile.py, Lib/test/test_tarfile.py.
     - CVE-2019-20907</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-03"/>
          <updated date="2025-10-03"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" impact="important" public="20200204">CVE-2019-9674</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-3" test_ref="oval:com.tuxcare.clsa:tst:1759510002008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760093575" version="1">
      <metadata>
        <title>Fix of 8 CVEs</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760093575" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760093575" source="CLSA"/>
        <reference ref_id="CVE-2022-0391" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-0391" source="CVE"/>
        <reference ref_id="CVE-2019-20907" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" source="CVE"/>
        <reference ref_id="CVE-2021-3737" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3737" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2022-48565" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48565" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-24329" source="CVE"/>
        <reference ref_id="CVE-2022-48560" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48560" source="CVE"/>
        <description>* SECURITY UPDATE: DoS in case of malicious XML entity declarations
     - debian/patches/CVE-2022-48565.patch: reject XML entity declarations
       in plist files
     - CVE-2022-48565
   * SECURITY UPDATE: Bypassing blocklisting methods by supplying a URL
     that starts with blank characters
     - debian/patches/CVE-2023-24329.patch,
       debian/patches/CVE-2023-24329-2.patch: prevent urllib.parse.urlparse
       from accepting schemes that don't begin with an alphabetical ASCII
       character
     - CVE-2023-24329
   * SECURITY UPDATE: ReDoS via specifically-crafted tar archives
     - debian/patches/CVE-2024-6232.patch: remove backtracking when parsing
       tarfile
     - CVE-2024-6232
   * SECURITY UPDATE: Excessive CPU usage while parsing a cookie value
     - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in
       parsing double-quoted cookie values with backslashes
     - CVE-2024-7592
   * SECURITY UPDATE: CPU DoS by crafting inputs to the IDNA decoder
     - debian/patches/CVE-2022-45061.patch: fix quadratic time idna
       decoding
     - CVE-2022-45061
   * SECURITY UPDATE: Use-after-free via heappushpop in heapq
     - debian/patches/CVE-2022-48560.patch: fix posible crash in heapq with
       custom comparison operators
     - debian/patches/CVE-2022-48560-2.patch: add tests for CVE-2022-48560
     - CVE-2022-48560
   * SECURITY UPDATE: DoS by HTTP client infinite line reading from
     malicious server after a 100 Continue response
     - debian/patches/CVE-2021-3737.patch: stop reading a header if it's
       too long
     - CVE-2021-3737
   * SECURITY UPDATE: A flaw in the urllib.parse module
     - debian/patches/CVE-2022-0391.patch: make urlparse sanitize URLs
       containing ASCII newline and tabs
     - CVE-2022-0391</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-10"/>
          <updated date="2025-10-10"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-0391" impact="important" public="20220209">CVE-2022-0391</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2019-20907" impact="important" public="20200713">CVE-2019-20907</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3737" impact="important" public="20220304">CVE-2021-3737</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-611" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48565" impact="critical" public="20230822">CVE-2022-48565</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48560" impact="important" public="20230822">CVE-2022-48560</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-6" test_ref="oval:com.tuxcare.clsa:tst:1760093575008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760369700" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2020-26116, CVE-2020-8492</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760369700" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760369700" source="CLSA"/>
        <reference ref_id="CVE-2020-26116" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" source="CVE"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-8492" source="CVE"/>
        <description>* SECURITY UPDATE: DoS in regular expression because of
     urllib.request.AbstractBasicAuthHandler catastrophic backtracking
     - debian/patches/CVE-2020-8492.patch: fix DoS in the urllib regexp
     - CVE-2020-8492
   * SECURITY UPDATE: a header injection vulnerability for http methods
     in the httplib
     - debian/patches/CVE-2020-26116.patch: prevent header injection in
     http methods in httplib
     - CVE-2020-26116</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-13"/>
          <updated date="2025-10-13"/>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:P/A:N" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-26116" impact="important" public="20200927">CVE-2020-26116</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2020-8492" impact="moderate" public="20200130">CVE-2020-8492</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-7" test_ref="oval:com.tuxcare.clsa:tst:1760369700008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760706062" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760706062" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1760706062" source="CLSA"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2021-23336" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-23336" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" source="CVE"/>
        <reference ref_id="CVE-2022-48566" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48566" source="CVE"/>
        <reference ref_id="CVE-2021-3733" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3733" source="CVE"/>
        <description>* SECURITY UPDATE: Web cache poisoning vulnerability
     - debian/patches/CVE-2021-23336.patch: fix web cache poisoning
       via urllib.parse.parse_qsl and urllib.parse.parse_qs
     - CVE-2021-23336
   * SECURITY UPDATE: Regular expression denial of service
     - debian/patches/CVE-2021-3733.patch: fix flaw in urllib’s
       AbstractBasicAuthHandler that could lead to a denial of service
       by leveraging a regular expression
     - CVE-2021-3733
   * SECURITY UPDATE: Constant-time-defeating optimisations issue
     - debian/patches/CVE-2022-48566.patch: make compare_digest more
       constant-time
     - CVE-2022-48566
   * SECURITY UPDATE: Incorrect parsing of email addresses containing special
     characters
     - debian/patches/CVE-2023-27043.patch: Fix email address parsing errors by
       adding optional 'strict' parameter to getaddresses() and parseaddr()
       functions
     - CVE-2023-27043
   * SECURITY UPDATE: TLS handshake bypass
     - debian/patches/CVE-2023-40217.patch: Check for &amp; avoid the ssl
       pre-close flaw. Update SSL tests
     - CVE-2023-40217</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-17"/>
          <updated date="2025-10-17"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss2="4.0/AV:N/AC:H/Au:N/C:N/I:P/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-23336" impact="moderate" public="20210215">CVE-2021-23336</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-362" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-48566" impact="moderate" public="20230822">CVE-2022-48566</cve>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2021-3733" impact="moderate" public="20220310">CVE-2021-3733</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-8" test_ref="oval:com.tuxcare.clsa:tst:1760706062008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1762527353" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1762527353" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1762527353" source="CLSA"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517
   * TEST UPDATE: Incorrect encoding leading to an unexpected
     exception in test_tarfile.py
     - debian/patch/fix_test_tarfile-enconding.patch: fix encoding</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-07"/>
          <updated date="2025-11-07"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-19" test_ref="oval:com.tuxcare.clsa:tst:1762527353007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1764843464" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-9287</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1764843464" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1764843464" source="CLSA"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" source="CVE"/>
        <description>* SECURITY UPDATE: Command injection vulnerability in venv module activation
     scripts when virtual environment paths contain special shell characters
     - debian/patches/CVE-2024-9287.patch: Properly quote template
       strings in venv activation scripts</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-04"/>
          <updated date="2025-12-04"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-4" test_ref="oval:com.tuxcare.clsa:tst:1764843464007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1764872525" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2024-6232, CVE-2024-7592, CVE-2024-9287</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1764872525" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1764872525" source="CLSA"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" source="CVE"/>
        <description>* SECURITY UPDATE: ReDoS in tarfile module when parsing specially
     crafted tar archive headers
     - debian/patches/CVE-2024-6232.patch: Remove backtracking from
       tarfile header parsing
   * SECURITY UPDATE: DoS due to quadratic time complexity in http.cookies
     module when parsing quoted cookie values with backslashes
     - debian/patches/CVE-2024-7592.patch: Replace iterative regex search
       with single-pass substitution to eliminate quadratic complexity
   * SECURITY UPDATE: Command injection vulnerability in venv module activation
     scripts when virtual environment paths contain special shell characters
     - debian/patches/CVE-2024-9287.patch: Properly quote template
       strings in venv activation scripts</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-04"/>
          <updated date="2025-12-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-5" test_ref="oval:com.tuxcare.clsa:tst:1764872525007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1765793933" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-6597</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1765793933" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1765793933" source="CLSA"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" source="CVE"/>
        <description>* SECURITY UPDATE: Ability to modify permissions with privileged programs
     - debian/patches/CVE-2023-6597: prevent tempfile.TemporaryDirectory
       class dereference symlinks
     - CVE-2023-6597</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-15"/>
          <updated date="2025-12-15"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-20" test_ref="oval:com.tuxcare.clsa:tst:1765793933007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1766142924" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-6597</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1766142924" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1766142924" source="CLSA"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" source="CVE"/>
        <description>* SECURITY UPDATE: Ability to modify permissions with privileged programs
     - debian/patches/CVE-2023-6597.patch: prevent tempfile.TemporaryDirectory
       class dereference symlinks
     - CVE-2023-6597</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-19"/>
          <updated date="2025-12-19"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-6" test_ref="oval:com.tuxcare.clsa:tst:1766142924007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1767089726" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2023-27043, CVE-2023-40217</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2025:1767089726" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2025:1767089726" source="CLSA"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" source="CVE"/>
        <description>* SECURITY UPDATE: Bypass of domain e-mail-based protection mechanism by
     incorrect parsing of e-mail addresses that contain a special character
     - debian/patches/CVE-2023-27043.patch: reject malformed addresses in
       email.parseaddr()
     - CVE-2023-27043
   * SECURITY UPDATE: Bypass of the TLS handshake and included protections
     - debian/patches/CVE-2023-40217.patch: check for &amp; avoid the ssl
       pre-close flaw
     - CVE-2023-40217</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-12-30"/>
          <updated date="2025-12-30"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-7" test_ref="oval:com.tuxcare.clsa:tst:1767089726007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768554703" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768554703" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768554703" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-21" test_ref="oval:com.tuxcare.clsa:tst:1768554703007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768569080" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768569080" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768569080" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080001"/>
        <criterion comment="alt-python39-debug is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080002"/>
        <criterion comment="alt-python39-devel is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080003"/>
        <criterion comment="alt-python39-idle is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080004"/>
        <criterion comment="alt-python39-libs is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080005"/>
        <criterion comment="alt-python39-test is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080006"/>
        <criterion comment="alt-python39-tkinter is earlier than 0:3.9.23-4" test_ref="oval:com.tuxcare.clsa:tst:1768569080007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768571053" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2007-4559, CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768571053" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768571053" source="CLSA"/>
        <reference ref_id="CVE-2007-4559" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2007-4559" source="CVE"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084
   * SECURITY UPDATE: Overwriting of arbitrary files by remote attackers
     - debian/patches/CVE-2007-4559.patch: implement PEP 706 - a filter in
       the tarfile module to prevent directory traversal vulnerability
     - CVE-2007-4559</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2007-4559" impact="moderate" public="20070828">CVE-2007-4559</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-8" test_ref="oval:com.tuxcare.clsa:tst:1768571053007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768588281" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084, CVE-2025-13836</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768588281" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1768588281" source="CLSA"/>
        <reference ref_id="CVE-2025-13836" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13836" source="CVE"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Potential denial of service in http.client
     - debian/patches/CVE-2025-13836.patch: Read large data by
       chunks instead of allocating memory based on Content-Length
     - CVE-2025-13836
   * SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: Remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-16"/>
          <updated date="2026-01-16"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13836" impact="critical" public="20251201">CVE-2025-13836</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-5" test_ref="oval:com.tuxcare.clsa:tst:1768588281007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771327791" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771327791" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771327791" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-23" test_ref="oval:com.tuxcare.clsa:tst:1771327791007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771328775" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771328775" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771328775" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-7" test_ref="oval:com.tuxcare.clsa:tst:1771328775007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771329439" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771329439" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771329439" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-10" test_ref="oval:com.tuxcare.clsa:tst:1771329439007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771343618" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-13837</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771343618" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771343618" source="CLSA"/>
        <reference ref_id="CVE-2025-13837" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" source="CVE"/>
        <description>* SECURITY UPDATE: Memory denial of service in plistlib
     - debian/patches/CVE-2025-13837.patch: read large data by chunks,
       therefore the upper limit of consumed memory is proportional to the
       size of the input file.
     - CVE-2025-13837</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-17"/>
          <updated date="2026-02-17"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-13837" impact="moderate" public="20251201">CVE-2025-13837</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618001"/>
        <criterion comment="alt-python39-debug is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618002"/>
        <criterion comment="alt-python39-devel is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618003"/>
        <criterion comment="alt-python39-idle is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618004"/>
        <criterion comment="alt-python39-libs is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618005"/>
        <criterion comment="alt-python39-test is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618006"/>
        <criterion comment="alt-python39-tkinter is earlier than 0:3.9.23-6" test_ref="oval:com.tuxcare.clsa:tst:1771343618007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771869183" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2015-20107</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771869183" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771869183" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>* SECURITY UPDATE: Shell command injection in mailcap module
     - debian/patches/CVE-2015-20107.patch: sanitize the second
       argument which allowing shell commands injection
     - CVE-2015-20107</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-23"/>
          <updated date="2026-02-23"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-9" test_ref="oval:com.tuxcare.clsa:tst:1771869183008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771870811" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771870811" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1771870811" source="CLSA"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-23"/>
          <updated date="2026-02-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-11" test_ref="oval:com.tuxcare.clsa:tst:1771870811007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772023234" version="1">
      <metadata>
        <title>Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772023234" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772023234" source="CLSA"/>
        <reference ref_id="CVE-2025-4435" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" source="CVE"/>
        <reference ref_id="CVE-2024-12718" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" source="CVE"/>
        <reference ref_id="CVE-2025-4138" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" source="CVE"/>
        <reference ref_id="CVE-2025-4330" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" source="CVE"/>
        <reference ref_id="CVE-2025-4517" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" source="CVE"/>
        <description>* SECURITY UPDATE: Traversing outside chmod directory
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filters directory members
       before chmod/chown
     - CVE-2024-12718
   * SECURITY UPDATE: Symlink exfiltration
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: properly handles different link
       semantics
     - CVE-2025-4138
   * SECURITY UPDATE: Hardlink Fallback Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: re-filter the source if hardlink
       extraction falls back to copying
     - CVE-2025-4330
   * SECURITY UPDATE: Errorlevel=0 Extracts Rejected Members
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: account errorlevel
     - CVE-2025-4435
   * SECURITY UPDATE: PATH_MAX Attack
     - debian/patches/CVE-2024-12718-CVE-2025-4138-CVE-2025-4330-CVE
       -2025-4435-CVE-2025-4517.patch: prevents PATH_MAX overflow
       attacks
     - CVE-2025-4517</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-25"/>
          <updated date="2026-02-25"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4435" impact="important" public="20250603">CVE-2025-4435</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-12718" impact="important" public="20250603">CVE-2024-12718</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4138" impact="important" public="20250603">CVE-2025-4138</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4330" impact="important" public="20250603">CVE-2025-4330</cve>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-4517" impact="important" public="20250603">CVE-2025-4517</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-8" test_ref="oval:com.tuxcare.clsa:tst:1772023234007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772099334" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2015-20107</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772099334" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772099334" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" source="CVE"/>
        <description>* SECURITY UPDATE: Shell command injection in the mailcap module
     - debian/patches/CVE-2015-20107.patch: sanitize the second
       argument which allowing shell command injection
     - CVE-2015-20107</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss2="8.0/AV:N/AC:L/Au:S/C:P/I:C/A:P" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-77" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2015-20107" impact="important" public="20220413">CVE-2015-20107</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-25" test_ref="oval:com.tuxcare.clsa:tst:1772099334007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772109757" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-12084</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772109757" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772109757" source="CLSA"/>
        <reference ref_id="CVE-2025-12084" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in xml.minidom node ID cache
     clearing
     - debian/patches/CVE-2025-12084.patch: remove quadratic behavior in
       xml.minidom node ID cache clearing
     - CVE-2025-12084</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-26"/>
          <updated date="2026-02-26"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-407" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-12084" impact="moderate" public="20251203">CVE-2025-12084</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-10" test_ref="oval:com.tuxcare.clsa:tst:1772109757008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772209911" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772209911" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772209911" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-27"/>
          <updated date="2026-02-27"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911001"/>
        <criterion comment="alt-python39-debug is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911002"/>
        <criterion comment="alt-python39-devel is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911003"/>
        <criterion comment="alt-python39-idle is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911004"/>
        <criterion comment="alt-python39-libs is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911005"/>
        <criterion comment="alt-python39-test is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911006"/>
        <criterion comment="alt-python39-tkinter is earlier than 0:3.9.23-8" test_ref="oval:com.tuxcare.clsa:tst:1772209911007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772444811" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772444811" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772444811" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-27" test_ref="oval:com.tuxcare.clsa:tst:1772444811007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772447145" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772447145" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772447145" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-13" test_ref="oval:com.tuxcare.clsa:tst:1772447145007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772617788" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772617788" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772617788" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-04"/>
          <updated date="2026-03-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-28" test_ref="oval:com.tuxcare.clsa:tst:1772617788007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772618958" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772618958" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772618958" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-04"/>
          <updated date="2026-03-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37 is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958001"/>
        <criterion comment="alt-python37-debug is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958002"/>
        <criterion comment="alt-python37-devel is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958003"/>
        <criterion comment="alt-python37-libs is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958004"/>
        <criterion comment="alt-python37-test is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958005"/>
        <criterion comment="alt-python37-tkinter is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958006"/>
        <criterion comment="alt-python37-tools is earlier than 0:3.7.17-14" test_ref="oval:com.tuxcare.clsa:tst:1772618958007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772621100" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772621100" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772621100" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: Quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: fix quadratic complexity in
       os.path.expandvars() by replacing the character-by-character loop
       with regex-based substitution in both posixpath and ntpath modules.
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-04"/>
          <updated date="2026-03-04"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-10" test_ref="oval:com.tuxcare.clsa:tst:1772621100007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772700927" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772700927" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772700927" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-11" test_ref="oval:com.tuxcare.clsa:tst:1772700927008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772702513" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772702513" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772702513" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-11" test_ref="oval:com.tuxcare.clsa:tst:1772702513007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772709963" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-8194</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772709963" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1772709963" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" source="CVE"/>
        <description>* SECURITY UPDATE: defect in 'tarfile' module leads to infinite loop and
     deadlock in parsing of maliciously crafted tar archives
     - debian/patches/CVE-2025-8194.patch: Validate archives to ensure member
       offsets are non-negative
     - CVE-2025-8194</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-05"/>
          <updated date="2026-03-05"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963001"/>
        <criterion comment="alt-python39-debug is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963002"/>
        <criterion comment="alt-python39-devel is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963003"/>
        <criterion comment="alt-python39-idle is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963004"/>
        <criterion comment="alt-python39-libs is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963005"/>
        <criterion comment="alt-python39-test is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963006"/>
        <criterion comment="alt-python39-tkinter is earlier than 0:3.9.23-9" test_ref="oval:com.tuxcare.clsa:tst:1772709963007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773222550" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2025-6075</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773222550" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1773222550" source="CLSA"/>
        <reference ref_id="CVE-2025-6075" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" source="CVE"/>
        <description>* SECURITY UPDATE: quadratic complexity in os.path.expandvars()
     - debian/patches/CVE-2025-6075.patch: replace character-by-character loop
       with regex-based substitution to fix quadratic complexity
     - CVE-2025-6075</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-11"/>
          <updated date="2026-03-11"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-6075" impact="moderate" public="20251031">CVE-2025-6075</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-12" test_ref="oval:com.tuxcare.clsa:tst:1773222550008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1774959696" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1774959696" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1774959696" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-31"/>
          <updated date="2026-03-31"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39-setuptools is earlier than 0:58.3.0-2" test_ref="oval:com.tuxcare.clsa:tst:1774959696001"/>
        <criterion comment="alt-python39-setuptools-wheel is earlier than 0:58.3.0-2" test_ref="oval:com.tuxcare.clsa:tst:1774959696002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776158564" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776158564" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158564" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-14"/>
          <updated date="2026-04-14"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38-setuptools is earlier than 0:58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776158564001"/>
        <criterion comment="alt-python38-setuptools-wheel is earlier than 0:58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776158564002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776164189" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776164189" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776164189" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-14"/>
          <updated date="2026-04-14"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36-setuptools is earlier than 0:38.5.2-10" test_ref="oval:com.tuxcare.clsa:tst:1776164189001"/>
        <criterion comment="alt-python36-setuptools-wheel is earlier than 0:38.5.2-10" test_ref="oval:com.tuxcare.clsa:tst:1776164189002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776324400" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776324400" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776324400" source="CLSA"/>
        <reference ref_id="CVE-2025-47273" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" source="CVE"/>
        <reference ref_id="CVE-2022-40897" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" source="CVE"/>
        <reference ref_id="CVE-2024-6345" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" source="CVE"/>
        <description>* SECURITY UPDATE: regex denial of service via crafted HTML
     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex
     - CVE-2022-40897
   * SECURITY UPDATE: remote code execution via command injection in VCS downloads
     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call
     - CVE-2024-6345
   * SECURITY UPDATE: path traversal in download filename resolution
     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir
     - CVE-2025-47273</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-16"/>
          <updated date="2026-04-16"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273" impact="important" public="20250517">CVE-2025-47273</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897" impact="moderate" public="20221223">CVE-2022-40897</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-94" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345" impact="important" public="20240715">CVE-2024-6345</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python37-setuptools is earlier than 0:58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776324400001"/>
        <criterion comment="alt-python37-setuptools-wheel is earlier than 0:58.3.0-3" test_ref="oval:com.tuxcare.clsa:tst:1776324400002"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776417233" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776417233" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776417233" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: webbrowser.open() allows command-line option injection
     via URLs with leading dashes
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection in
       browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python38 is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233001"/>
        <criterion comment="alt-python38-debug is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233002"/>
        <criterion comment="alt-python38-devel is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233003"/>
        <criterion comment="alt-python38-idle is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233004"/>
        <criterion comment="alt-python38-libs is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233005"/>
        <criterion comment="alt-python38-test is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233006"/>
        <criterion comment="alt-python38-tkinter is earlier than 0:3.8.20-12" test_ref="oval:com.tuxcare.clsa:tst:1776417233007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776419223" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776419223" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776419223" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python27 is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223001"/>
        <criterion comment="alt-python27-debug is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223002"/>
        <criterion comment="alt-python27-devel is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223003"/>
        <criterion comment="alt-python27-idle is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223004"/>
        <criterion comment="alt-python27-libs is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223005"/>
        <criterion comment="alt-python27-test is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223006"/>
        <criterion comment="alt-python27-tkinter is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223007"/>
        <criterion comment="alt-python27-tools is earlier than 0:2.7.18-14" test_ref="oval:com.tuxcare.clsa:tst:1776419223008"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776420266" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776420266" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776420266" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: command-line option injection in webbrowser.open()
     - debian/patches/CVE-2026-4519.patch: reject leading dashes in
       webbrowser.open() URLs to prevent command-line option injection
       in browser subprocesses
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266001"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266002"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266003"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266004"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266005"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266006"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-29" test_ref="oval:com.tuxcare.clsa:tst:1776420266007"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1776425406" version="1">
      <metadata>
        <title>Fix CVE(s): CVE-2026-4519</title>
        <affected family="unix">
          <platform>Debian 12</platform>
        </affected>
        <reference ref_id="CLSA-2026:1776425406" ref_url="https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776425406" source="CLSA"/>
        <reference ref_id="CVE-2026-4519" ref_url="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" source="CVE"/>
        <description>* SECURITY UPDATE: webbrowser.open() accepts leading dashes in URLs which
     could be interpreted as command-line options by web browsers
     - debian/patches/CVE-2026-4519.patch: reject URLs starting with dashes
       in BaseBrowser._check_url() before passing to subprocess
     - CVE-2026-4519</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-17"/>
          <updated date="2026-04-17"/>
          <cve cvss3="3.3000000000000003/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-alt-python/cve/CVE-2026-4519" impact="low" public="20260320">CVE-2026-4519</cve>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python39 is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406001"/>
        <criterion comment="alt-python39-debug is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406002"/>
        <criterion comment="alt-python39-devel is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406003"/>
        <criterion comment="alt-python39-idle is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406004"/>
        <criterion comment="alt-python39-libs is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406005"/>
        <criterion comment="alt-python39-test is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406006"/>
        <criterion comment="alt-python39-tkinter is earlier than 0:3.9.23-10" test_ref="oval:com.tuxcare.clsa:tst:1776425406007"/>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-14" id="oval:com.tuxcare.clsa:tst:1759247489007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759247489001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-3" id="oval:com.tuxcare.clsa:tst:1759510002008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1759510002001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-6" id="oval:com.tuxcare.clsa:tst:1760093575008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760093575001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-7" id="oval:com.tuxcare.clsa:tst:1760369700008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760369700001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-8" id="oval:com.tuxcare.clsa:tst:1760706062008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1760706062001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-19" id="oval:com.tuxcare.clsa:tst:1762527353007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1762527353001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-4" id="oval:com.tuxcare.clsa:tst:1764843464007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764843464001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-5" id="oval:com.tuxcare.clsa:tst:1764872525007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1764872525001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-20" id="oval:com.tuxcare.clsa:tst:1765793933007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1765793933001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-6" id="oval:com.tuxcare.clsa:tst:1766142924007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1766142924001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-7" id="oval:com.tuxcare.clsa:tst:1767089726007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1767089726001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-21" id="oval:com.tuxcare.clsa:tst:1768554703007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768554703001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 0:3.9.23-4" id="oval:com.tuxcare.clsa:tst:1768569080007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768569080001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-8" id="oval:com.tuxcare.clsa:tst:1768571053007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768571053001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-5" id="oval:com.tuxcare.clsa:tst:1768588281007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1768588281001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-23" id="oval:com.tuxcare.clsa:tst:1771327791007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771327791001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-7" id="oval:com.tuxcare.clsa:tst:1771328775007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771328775001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-10" id="oval:com.tuxcare.clsa:tst:1771329439007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771329439001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 0:3.9.23-6" id="oval:com.tuxcare.clsa:tst:1771343618007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771343618001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-9" id="oval:com.tuxcare.clsa:tst:1771869183008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771869183001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-11" id="oval:com.tuxcare.clsa:tst:1771870811007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1771870811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-8" id="oval:com.tuxcare.clsa:tst:1772023234007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772023234001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-25" id="oval:com.tuxcare.clsa:tst:1772099334007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772099334001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-10" id="oval:com.tuxcare.clsa:tst:1772109757008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772109757001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 0:3.9.23-8" id="oval:com.tuxcare.clsa:tst:1772209911007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772209911001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-27" id="oval:com.tuxcare.clsa:tst:1772444811007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772444811001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-13" id="oval:com.tuxcare.clsa:tst:1772447145007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772447145001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-28" id="oval:com.tuxcare.clsa:tst:1772617788007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772617788001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37 is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-debug is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-devel is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-libs is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-test is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tkinter is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-tools is earlier than 0:3.7.17-14" id="oval:com.tuxcare.clsa:tst:1772618958007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764872525007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772618958001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-10" id="oval:com.tuxcare.clsa:tst:1772621100007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772621100001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-11" id="oval:com.tuxcare.clsa:tst:1772700927008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772700927001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-11" id="oval:com.tuxcare.clsa:tst:1772702513007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772702513001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 0:3.9.23-9" id="oval:com.tuxcare.clsa:tst:1772709963007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1772709963001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-12" id="oval:com.tuxcare.clsa:tst:1773222550008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1773222550001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-setuptools is earlier than 0:58.3.0-2" id="oval:com.tuxcare.clsa:tst:1774959696001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1774959696001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1774959696001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-setuptools-wheel is earlier than 0:58.3.0-2" id="oval:com.tuxcare.clsa:tst:1774959696002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1774959696002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1774959696001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-setuptools is earlier than 0:58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776158564001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1776158564001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776158564001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-setuptools-wheel is earlier than 0:58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776158564002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1776158564002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776158564001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-setuptools is earlier than 0:38.5.2-10" id="oval:com.tuxcare.clsa:tst:1776164189001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1776164189001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776164189001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-setuptools-wheel is earlier than 0:38.5.2-10" id="oval:com.tuxcare.clsa:tst:1776164189002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1776164189002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776164189001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-setuptools is earlier than 0:58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776324400001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1776324400001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776158564001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python37-setuptools-wheel is earlier than 0:58.3.0-3" id="oval:com.tuxcare.clsa:tst:1776324400002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1776324400002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776158564001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38 is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-debug is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-devel is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-idle is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-libs is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-test is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python38-tkinter is earlier than 0:3.8.20-12" id="oval:com.tuxcare.clsa:tst:1776417233007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1764843464007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776417233001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27 is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-debug is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-devel is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-idle is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-libs is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-test is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tkinter is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python27-tools is earlier than 0:2.7.18-14" id="oval:com.tuxcare.clsa:tst:1776419223008" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759510002008"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776419223001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-29" id="oval:com.tuxcare.clsa:tst:1776420266007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1759247489007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776420266001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39 is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406001" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080001"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-debug is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406002" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080002"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-devel is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406003" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080003"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-idle is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406004" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080004"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-libs is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406005" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080005"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-test is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406006" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080006"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
    <linux:dpkginfo_test check="at least one" comment="alt-python39-tkinter is earlier than 0:3.9.23-10" id="oval:com.tuxcare.clsa:tst:1776425406007" version="1">
      <linux:object object_ref="oval:com.tuxcare.clsa:obj:1768569080007"/>
      <linux:state state_ref="oval:com.tuxcare.clsa:ste:1776425406001"/>
    </linux:dpkginfo_test>
  </tests>
  <objects>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489001" version="1">
      <linux:name>alt-python36</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489002" version="1">
      <linux:name>alt-python36-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489003" version="1">
      <linux:name>alt-python36-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489004" version="1">
      <linux:name>alt-python36-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489005" version="1">
      <linux:name>alt-python36-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489006" version="1">
      <linux:name>alt-python36-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759247489007" version="1">
      <linux:name>alt-python36-tools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002001" version="1">
      <linux:name>alt-python27</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002002" version="1">
      <linux:name>alt-python27-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002003" version="1">
      <linux:name>alt-python27-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002004" version="1">
      <linux:name>alt-python27-idle</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002005" version="1">
      <linux:name>alt-python27-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002006" version="1">
      <linux:name>alt-python27-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002007" version="1">
      <linux:name>alt-python27-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1759510002008" version="1">
      <linux:name>alt-python27-tools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464001" version="1">
      <linux:name>alt-python38</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464002" version="1">
      <linux:name>alt-python38-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464003" version="1">
      <linux:name>alt-python38-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464004" version="1">
      <linux:name>alt-python38-idle</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464005" version="1">
      <linux:name>alt-python38-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464006" version="1">
      <linux:name>alt-python38-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764843464007" version="1">
      <linux:name>alt-python38-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525001" version="1">
      <linux:name>alt-python37</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525002" version="1">
      <linux:name>alt-python37-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525003" version="1">
      <linux:name>alt-python37-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525004" version="1">
      <linux:name>alt-python37-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525005" version="1">
      <linux:name>alt-python37-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525006" version="1">
      <linux:name>alt-python37-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1764872525007" version="1">
      <linux:name>alt-python37-tools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080001" version="1">
      <linux:name>alt-python39</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080002" version="1">
      <linux:name>alt-python39-debug</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080003" version="1">
      <linux:name>alt-python39-devel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080004" version="1">
      <linux:name>alt-python39-idle</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080005" version="1">
      <linux:name>alt-python39-libs</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080006" version="1">
      <linux:name>alt-python39-test</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1768569080007" version="1">
      <linux:name>alt-python39-tkinter</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1774959696001" version="1">
      <linux:name>alt-python39-setuptools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1774959696002" version="1">
      <linux:name>alt-python39-setuptools-wheel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776158564001" version="1">
      <linux:name>alt-python38-setuptools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776158564002" version="1">
      <linux:name>alt-python38-setuptools-wheel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776164189001" version="1">
      <linux:name>alt-python36-setuptools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776164189002" version="1">
      <linux:name>alt-python36-setuptools-wheel</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776324400001" version="1">
      <linux:name>alt-python37-setuptools</linux:name>
    </linux:dpkginfo_object>
    <linux:dpkginfo_object id="oval:com.tuxcare.clsa:obj:1776324400002" version="1">
      <linux:name>alt-python37-setuptools-wheel</linux:name>
    </linux:dpkginfo_object>
  </objects>
  <states>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1759247489001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-14</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1759510002001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-3</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760093575001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-6</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760369700001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-7</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1760706062001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-8</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1762527353001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-19</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1764843464001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-4</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1764872525001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-5</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1765793933001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-20</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1766142924001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-6</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1767089726001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-7</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768554703001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-21</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768569080001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.9.23-4</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768571053001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-8</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1768588281001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-5</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771327791001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-23</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771328775001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-7</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771329439001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-10</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771343618001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.9.23-6</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771869183001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-9</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1771870811001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-11</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772023234001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-8</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772099334001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-25</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772109757001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-10</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772209911001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.9.23-8</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772444811001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-27</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772447145001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-13</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772617788001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-28</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772618958001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.7.17-14</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772621100001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-10</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772700927001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-11</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772702513001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-11</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1772709963001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.9.23-9</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1773222550001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-12</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1774959696001" version="1">
      <linux:evr datatype="evr_string" operation="less than">0:58.3.0-2</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776158564001" version="1">
      <linux:evr datatype="evr_string" operation="less than">0:58.3.0-3</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776164189001" version="1">
      <linux:evr datatype="evr_string" operation="less than">0:38.5.2-10</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776417233001" version="1">
      <linux:arch datatype="string" operation="pattern match">amd64|arm64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.8.20-12</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776419223001" version="1">
      <linux:arch datatype="string" operation="equals">amd64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:2.7.18-14</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776420266001" version="1">
      <linux:arch datatype="string" operation="pattern match">amd64|arm64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.6.15-29</linux:evr>
    </linux:dpkginfo_state>
    <linux:dpkginfo_state id="oval:com.tuxcare.clsa:ste:1776425406001" version="1">
      <linux:arch datatype="string" operation="pattern match">amd64|arm64</linux:arch>
      <linux:evr datatype="evr_string" operation="less than">0:3.9.23-10</linux:evr>
    </linux:dpkginfo_state>
  </states>
</oval_definitions>
