<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>Tuxcare Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2025-07-22T17:35:44</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1748330202" version="1">
      <metadata>
        <title>alt-python36: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1748330202" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1748330202" source="CLSA"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" source="CVE"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-40217" source="CVE"/>
        <reference ref_id="CVE-2021-28861" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" source="CVE"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" source="CVE"/>
        <reference ref_id="CVE-2023-27043" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-27043" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" source="CVE"/>
        <reference ref_id="CVE-2024-9287" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" source="CVE"/>
        <description>- CVE-2023-24329: make urllib.parse.urlparse enforce that a scheme must
  begin with an alphabetical ASCII character
- CVE-2023-40217: check for &amp; avoid the ssl pre-close flaw
- CVE-2024-6232: remove backtracking when parsing tarfile headers
- CVE-2024-7592: fix quadratic complexity in parsing double-quoted cookie
  values with backslashes</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-05-27"/>
          <updated date="2025-05-27"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cwe="CWE-601" href="https://cve.tuxcare.com/els-lang/cve/CVE-2021-28861" impact="important" public="20220823">CVE-2021-28861</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-407" href="https://cve.tuxcare.com/els-lang/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-27043" impact="moderate" public="20230419">CVE-2023-27043</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els-lang/cve/CVE-2024-9287" impact="important" public="20241022">CVE-2024-9287</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202003"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202005"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202007"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202009"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202011"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-6.el6" test_ref="oval:com.tuxcare.clsa:tst:1748330202013"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1749037332" version="1">
      <metadata>
        <title>alt-python36: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1749037332" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1749037332" source="CLSA"/>
        <reference ref_id="CVE-2007-4559" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2007-4559" source="CVE"/>
        <reference ref_id="CVE-2023-6597" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2023-6597" source="CVE"/>
        <description>- CVE-2007-4559: implement PEP 706 - a filter in the tarfile module to
  prevent directory traversal vulnerability
- CVE-2023-6597: prevent tempfile.TemporaryDirectory class dereference
  symlinks</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-06-04"/>
          <updated date="2025-06-04"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cwe="CWE-22" href="https://cve.tuxcare.com/els-lang/cve/CVE-2007-4559" impact="moderate" public="20070828">CVE-2007-4559</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cwe="CWE-61" href="https://cve.tuxcare.com/els-lang/cve/CVE-2023-6597" impact="important" public="20240319">CVE-2023-6597</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1749037332007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202014"/>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1753205719" version="1">
      <metadata>
        <title>alt-python36: Fix of CVE-2019-9674</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1753205719" ref_url="https://cve.tuxcare.com/els-lang/releases/CLSA-2025:1753205719" source="CLSA"/>
        <reference ref_id="CVE-2019-9674" ref_url="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" source="CVE"/>
        <description>- CVE-2019-9674: add pitfalls to zipfile module documentation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-22"/>
          <updated date="2025-07-22"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els-lang/cve/CVE-2019-9674" impact="important" public="20200204">CVE-2019-9674</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="alt-python36 is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719001"/>
        <criterion comment="alt-python36 isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202002"/>
        <criterion comment="alt-python36-debug is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719002"/>
        <criterion comment="alt-python36-debug isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202004"/>
        <criterion comment="alt-python36-devel is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719003"/>
        <criterion comment="alt-python36-devel isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202006"/>
        <criterion comment="alt-python36-libs is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719004"/>
        <criterion comment="alt-python36-libs isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202008"/>
        <criterion comment="alt-python36-test is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719005"/>
        <criterion comment="alt-python36-test isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202010"/>
        <criterion comment="alt-python36-tkinter is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719006"/>
        <criterion comment="alt-python36-tkinter isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202012"/>
        <criterion comment="alt-python36-tools is earlier than 0:3.6.15-8.el6" test_ref="oval:com.tuxcare.clsa:tst:1753205719007"/>
        <criterion comment="alt-python36-tools isn't signed with TuxCare key" test_ref="oval:com.tuxcare.clsa:tst:1748330202014"/>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36 isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-debug isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-devel isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-libs isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-test isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-tkinter isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-6.el6" id="oval:com.tuxcare.clsa:tst:1748330202013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="alt-python36-tools isn't signed with TuxCare key" id="oval:com.tuxcare.clsa:tst:1748330202014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748330202002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-7.el6" id="oval:com.tuxcare.clsa:tst:1749037332007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1749037332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36 is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-debug is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202003"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-devel is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-libs is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-test is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202009"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tkinter is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="alt-python36-tools is earlier than 0:3.6.15-8.el6" id="oval:com.tuxcare.clsa:tst:1753205719007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748330202013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753205719001"/>
    </red-def:rpminfo_test>
  </tests>
  <objects>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202001" version="1">
      <red-def:name>alt-python36</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202003" version="1">
      <red-def:name>alt-python36-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202005" version="1">
      <red-def:name>alt-python36-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202007" version="1">
      <red-def:name>alt-python36-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202009" version="1">
      <red-def:name>alt-python36-test</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202011" version="1">
      <red-def:name>alt-python36-tkinter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748330202013" version="1">
      <red-def:name>alt-python36-tools</red-def:name>
    </red-def:rpminfo_object>
  </objects>
  <states>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748330202001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-6.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748330202002" version="1">
      <red-def:signature_keyid operation="equals">d07bf2a08d50eb66</red-def:signature_keyid>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1749037332001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-7.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753205719001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.15-8.el6</red-def:evr>
    </red-def:rpminfo_state>
  </states>
</oval_definitions>
