<?xml version='1.0' encoding='UTF-8'?>
<oval_definitions xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
    <oval:product_name>Tuxcare Errata System</oval:product_name>
    <oval:product_version>0.0.1</oval:product_version>
    <oval:schema_version>5.10</oval:schema_version>
    <oval:timestamp>2026-04-17T21:00:48</oval:timestamp>
  </generator>
  <definitions>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1611743864" version="1">
      <metadata>
        <title>Fix CVE-2021-3156: Heap-based buffer overflow in sudo</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1611743864" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1611743864" source="CLSA"/>
        <reference ref_id="CVE-2021-3156" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3156" source="CVE"/>
        <description>Fix CVE-2021-3156: Heap-based buffer overflow in sudo.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-01-27"/>
          <updated date="2021-01-27"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-193" href="https://cve.tuxcare.com/els/cve/CVE-2021-3156" impact="important" public="20210126">CVE-2021-3156</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="sudo is earlier than 0:1.8.6p3-30.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1611743864002"/>
        <criteria operator="AND">
          <criterion comment="sudo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864003"/>
          <criterion comment="sudo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864004"/>
        </criteria>
        <criterion comment="sudo-devel is earlier than 0:1.8.6p3-30.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1611743864005"/>
        <criteria operator="AND">
          <criterion comment="sudo-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864006"/>
          <criterion comment="sudo-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864007"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1625650209" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-23240</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1625650209" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1625650209" source="CLSA"/>
        <reference ref_id="CVE-2021-23240" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-23240" source="CVE"/>
        <description>- sudo-1.8.6p3-CVE-2021-23240-2.patch: fixed issue with credentials management in sudoedit
- sudo-1.8.6p3-CVE-2021-23240-3.patch: fixed issue with origin file removal in sesh</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-07-07"/>
          <updated date="2021-07-07"/>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-59" href="https://cve.tuxcare.com/els/cve/CVE-2021-23240" impact="important" public="20210112">CVE-2021-23240</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="sudo is earlier than 0:1.8.6p3-32.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1625650209001"/>
        <criteria operator="AND">
          <criterion comment="sudo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864003"/>
          <criterion comment="sudo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864004"/>
        </criteria>
        <criterion comment="sudo-devel is earlier than 0:1.8.6p3-32.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1625650209002"/>
        <criteria operator="AND">
          <criterion comment="sudo-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864006"/>
          <criterion comment="sudo-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864007"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650910003" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2019-18276</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650910003" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650910003" source="CLSA"/>
        <reference ref_id="CVE-2019-18276" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-18276" source="CVE"/>
        <description>- CVE-2019-18276: Fix priviledge dropping when running with effective
  UID not equal to real UID</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-25"/>
          <updated date="2022-04-25"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-273" href="https://cve.tuxcare.com/els/cve/CVE-2019-18276" impact="important" public="20191128">CVE-2019-18276</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bash is earlier than 0:4.1.2-48.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1650910003001"/>
        <criteria operator="AND">
          <criterion comment="bash isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650910003002"/>
          <criterion comment="bash isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650910003003"/>
        </criteria>
        <criterion comment="bash-doc is earlier than 0:4.1.2-48.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1650910003004"/>
        <criteria operator="AND">
          <criterion comment="bash-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650910003005"/>
          <criterion comment="bash-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650910003006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1653005178" version="1">
      <metadata>
        <title>Fixed CVE-2022-1271 in gzip</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1653005178" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1653005178" source="CLSA"/>
        <reference ref_id="CVE-2022-1271" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1271" source="CVE"/>
        <description>- CVE-2022-1271: Fix arbitrary file override with crafted file names</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-05-20"/>
          <updated date="2022-05-20"/>
          <cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-1271" impact="important" public="20220407">CVE-2022-1271</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="gzip is earlier than 0:1.3.12-24.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1653005178001"/>
        <criteria operator="AND">
          <criterion comment="gzip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653005178002"/>
          <criterion comment="gzip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653005178003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261610" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-8625</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261610" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261610" source="CLSA"/>
        <reference ref_id="CVE-2020-8625" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8625" source="CVE"/>
        <description>- Fix buffer overflow in the SPNEGO implementation affecting GSSAPI security
  policy negotiation (CVE-2020-8625)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2020-8625" impact="important" public="20210217">CVE-2020-8625</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261610001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261610004"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261610007"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261610010"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261610013"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261610016"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261705" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-25215, CVE-2021-25214, CVE-2021-25216</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261705" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261705" source="CLSA"/>
        <reference ref_id="CVE-2021-25215" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-25215" source="CVE"/>
        <reference ref_id="CVE-2021-25214" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-25214" source="CVE"/>
        <reference ref_id="CVE-2021-25216" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-25216" source="CVE"/>
        <description>- A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214)
- An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215)
- A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack (CVE-2021-25216)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2021-25215" impact="important" public="20210429">CVE-2021-25215</cve>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2021-25214" impact="moderate" public="20210429">CVE-2021-25214</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-25216" impact="critical" public="20210429">CVE-2021-25216</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261705001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261705002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261705003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261705004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261705005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261705006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1637070791" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-25219</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1637070791" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1637070791" source="CLSA"/>
        <reference ref_id="CVE-2021-25219" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-25219" source="CVE"/>
        <description>- CVE-2021-25219: Fix resolver performance degradation via lame cache abuse</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-11-16"/>
          <updated date="2021-11-16"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-25219" impact="moderate" public="20211027">CVE-2021-25219</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637070791001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637070791002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637070791003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637070791004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637070791005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637070791006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1649331579" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-25220</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1649331579" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1649331579" source="CLSA"/>
        <reference ref_id="CVE-2021-25220" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-25220" source="CVE"/>
        <description>- CVE-2021-25220: fix possible cache poisoning from forwarder responses</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-07"/>
          <updated date="2022-04-07"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-25220" impact="important" public="20220323">CVE-2021-25220</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649331579001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649331579002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649331579003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649331579004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649331579005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649331579006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1657561196" version="1">
      <metadata>
        <title>Fixed CVE-2018-5741 in bind</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1657561196" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1657561196" source="CLSA"/>
        <reference ref_id="CVE-2018-5741" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-5741" source="CVE"/>
        <description>- CVE-2018-5741: update {krb5,ms}-{self,subdomain} descriptions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-11"/>
          <updated date="2022-07-11"/>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:P/A:N" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-863" href="https://cve.tuxcare.com/els/cve/CVE-2018-5741" impact="moderate" public="20190116">CVE-2018-5741</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1657561196001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1657561196002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1657561196003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1657561196004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1657561196005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1657561196006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650376937" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-28391</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650376937" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650376937" source="CLSA"/>
        <reference ref_id="CVE-2022-28391" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-28391" source="CVE"/>
        <description>- CVE-2022-28391: fix possible terminal injection attacks from DNS query results</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-19"/>
          <updated date="2022-04-19"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-28391" impact="critical" public="20220403">CVE-2022-28391</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="busybox is earlier than 1:1.15.1-21.el6_6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1650376937001"/>
        <criteria operator="AND">
          <criterion comment="busybox isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650376937002"/>
          <criterion comment="busybox isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650376937003"/>
        </criteria>
        <criterion comment="busybox-petitboot is earlier than 1:1.15.1-21.el6_6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1650376937004"/>
        <criteria operator="AND">
          <criterion comment="busybox-petitboot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650376937005"/>
          <criterion comment="busybox-petitboot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650376937006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1633601543" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-35452</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1633601543" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1633601543" source="CLSA"/>
        <reference ref_id="CVE-2020-35452" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-35452" source="CVE"/>
        <description>- CVE-2020-35452: fix stack overflow in mod_auth_digest due to
  crafted digest nonce</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-07"/>
          <updated date="2021-10-07"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2020-35452" impact="important" public="20210610">CVE-2020-35452</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-71.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633601543001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-71.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633601543004"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-71.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633601543007"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-71.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633601543010"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-71.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633601543013"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1634745216" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-39275</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1634745216" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1634745216" source="CLSA"/>
        <reference ref_id="CVE-2021-39275" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-39275" source="CVE"/>
        <description>- CVE-2021-39275: ap_escape_quotes() algorithm which led to 
  buffer overflow.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-20"/>
          <updated date="2021-10-20"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-39275" impact="critical" public="20210916">CVE-2021-39275</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745216001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745216002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745216003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745216004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745216005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1648136177" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-22721, CVE-2022-22720</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1648136177" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1648136177" source="CLSA"/>
        <reference ref_id="CVE-2022-22721" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22721" source="CVE"/>
        <reference ref_id="CVE-2022-22720" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22720" source="CVE"/>
        <description>- CVE-2022-22720: simpler connection close logic if discarding the request body fails
- CVE-2022-22721: make sure and check that LimitXMLRequestBody fits in system memory</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-24"/>
          <updated date="2022-03-24"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22721" impact="critical" public="20220314">CVE-2022-22721</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els/cve/CVE-2022-22720" impact="critical" public="20220314">CVE-2022-22720</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1648136177001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1648136177002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1648136177003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1648136177004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1648136177005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1656447241" version="1">
      <metadata>
        <title>Fixed CVEs in httpd: CVE-2022-31813, CVE-2022-28615, CVE-2022-26377</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1656447241" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1656447241" source="CLSA"/>
        <reference ref_id="CVE-2022-31813" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-31813" source="CVE"/>
        <reference ref_id="CVE-2022-26377" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-26377" source="CVE"/>
        <reference ref_id="CVE-2022-28615" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-28615" source="CVE"/>
        <description>- CVE-2022-26377: mod_proxy_ajp: fix HTTP request smuggling
- CVE-2022-28615: fix possible out-of-bounds read in ap_strcmp_match()
- CVE-2022-31813: mod_proxy: preserve original request headers so an upstream knows what
  the original request hostname was, and so send X-Forwarded-* headers correctly</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-28"/>
          <updated date="2022-06-28"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-345" href="https://cve.tuxcare.com/els/cve/CVE-2022-31813" impact="critical" public="20220609">CVE-2022-31813</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-444" href="https://cve.tuxcare.com/els/cve/CVE-2022-26377" impact="important" public="20220609">CVE-2022-26377</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-28615" impact="critical" public="20220609">CVE-2022-28615</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1656447241001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1656447241002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1656447241003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1656447241004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1656447241005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1608724009" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-8284</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2020:1608724009" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2020:1608724009" source="CLSA"/>
        <reference ref_id="CVE-2020-8284" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8284" source="CVE"/>
        <description>-  trusting FTP PASV responses (CVE-2020-8284)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2020-12-02"/>
          <updated date="2020-12-02"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-8284" impact="low" public="20201214">CVE-2020-8284</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-55.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724009001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-55.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724009004"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-55.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724009007"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1617285762" version="1">
      <metadata>
        <title>Fix of CVE-2021-22876</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1617285762" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1617285762" source="CLSA"/>
        <reference ref_id="CVE-2021-22876" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-22876" source="CVE"/>
        <description>- back-port urlapi from v7.75.0 (used by CVE-2021-22876)
- strip credentials from the auto-referer header (CVE-2021-22876)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-04-01"/>
          <updated date="2021-04-01"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-200" href="https://cve.tuxcare.com/els/cve/CVE-2021-22876" impact="moderate" public="20210401">CVE-2021-22876</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-56.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1617285762001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-56.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1617285762002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-56.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1617285762003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261872" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-22898</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261872" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261872" source="CLSA"/>
        <reference ref_id="CVE-2021-22898" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-22898" source="CVE"/>
        <description>- check sscanf() for correct number of matches (CVE-2021-22898)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cwe="CWE-909" href="https://cve.tuxcare.com/els/cve/CVE-2021-22898" impact="low" public="20210611">CVE-2021-22898</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-57.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261872001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-57.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261872002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-57.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261872003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261944" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-22925</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261944" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261944" source="CLSA"/>
        <reference ref_id="CVE-2021-22925" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-22925" source="CVE"/>
        <description>- telnet stack contents disclosure again (CVE-2021-22925)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-908" href="https://cve.tuxcare.com/els/cve/CVE-2021-22925" impact="moderate" public="20210805">CVE-2021-22925</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-58.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261944001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-58.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261944002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-58.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261944003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632262236" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-22924</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632262236" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632262236" source="CLSA"/>
        <reference ref_id="CVE-2021-22924" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-22924" source="CVE"/>
        <description>- fix connection reuse checks for issuer cert and case sensitivity (CVE-2021-22924)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-706" href="https://cve.tuxcare.com/els/cve/CVE-2021-22924" impact="low" public="20210805">CVE-2021-22924</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262236001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262236002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262236003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1656961923" version="1">
      <metadata>
        <title>Fixed CVE-2022-27782 in curl</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1656961923" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1656961923" source="CLSA"/>
        <reference ref_id="CVE-2022-27782" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-27782" source="CVE"/>
        <description>- CVE-2022-27782: add missing checks of ssl and ssh options during matching
  a connection for reuse</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-04"/>
          <updated date="2022-07-04"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-295" href="https://cve.tuxcare.com/els/cve/CVE-2022-27782" impact="important" public="20220602">CVE-2022-27782</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1656961923001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1656961923002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1656961923003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1654107183" version="1">
      <metadata>
        <title>Fixed CVE-2021-33582 in cyrus-imapd</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1654107183" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1654107183" source="CLSA"/>
        <reference ref_id="CVE-2021-33582" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-33582" source="CVE"/>
        <description>- CVE-2021-33582: Fix a bad string hashing algorithm which could lead to
  collisions and cause a CPU denial of service</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-01"/>
          <updated date="2022-06-01"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-327" href="https://cve.tuxcare.com/els/cve/CVE-2021-33582" impact="important" public="20210901">CVE-2021-33582</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="cyrus-imapd is earlier than 0:2.3.16-15.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654107183001"/>
        <criteria operator="AND">
          <criterion comment="cyrus-imapd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654107183002"/>
          <criterion comment="cyrus-imapd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654107183003"/>
        </criteria>
        <criterion comment="cyrus-imapd-devel is earlier than 0:2.3.16-15.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654107183004"/>
        <criteria operator="AND">
          <criterion comment="cyrus-imapd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654107183005"/>
          <criterion comment="cyrus-imapd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654107183006"/>
        </criteria>
        <criterion comment="cyrus-imapd-utils is earlier than 0:2.3.16-15.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654107183007"/>
        <criteria operator="AND">
          <criterion comment="cyrus-imapd-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654107183008"/>
          <criterion comment="cyrus-imapd-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654107183009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1623075541" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-25217</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1623075541" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1623075541" source="CLSA"/>
        <reference ref_id="CVE-2021-25217" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-25217" source="CVE"/>
        <description>- CVE-2021-25217: avoid buffer overrun</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-06-07"/>
          <updated date="2021-06-07"/>
          <cve cvss2="3.3/AV:A/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2021-25217" impact="important" public="20210526">CVE-2021-25217</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="dhclient is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075541001"/>
        <criteria operator="AND">
          <criterion comment="dhclient isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075541002"/>
          <criterion comment="dhclient isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075541003"/>
        </criteria>
        <criterion comment="dhcp is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075541004"/>
        <criteria operator="AND">
          <criterion comment="dhcp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075541005"/>
          <criterion comment="dhcp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075541006"/>
        </criteria>
        <criterion comment="dhcp-common is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075541007"/>
        <criteria operator="AND">
          <criterion comment="dhcp-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075541008"/>
          <criterion comment="dhcp-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075541009"/>
        </criteria>
        <criterion comment="dhcp-devel is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075541010"/>
        <criteria operator="AND">
          <criterion comment="dhcp-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075541011"/>
          <criterion comment="dhcp-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075541012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1634573745" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-25275, CVE-2020-12100</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1634573745" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1634573745" source="CLSA"/>
        <reference ref_id="CVE-2020-12100" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-12100" source="CVE"/>
        <reference ref_id="CVE-2020-25275" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25275" source="CVE"/>
        <description>- CVE-2020-12100: Resource exhaustion via deeply nested MIME parts
- CVE-2020-25275: Denial of service via mail MIME parsing</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-18"/>
          <updated date="2021-10-18"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2020-12100" impact="important" public="20200812">CVE-2020-12100</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-25275" impact="important" public="20210104">CVE-2020-25275</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="dovecot is earlier than 1:2.0.9-23.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634573745001"/>
        <criteria operator="AND">
          <criterion comment="dovecot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745002"/>
          <criterion comment="dovecot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745003"/>
        </criteria>
        <criterion comment="dovecot-devel is earlier than 1:2.0.9-23.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634573745004"/>
        <criteria operator="AND">
          <criterion comment="dovecot-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745005"/>
          <criterion comment="dovecot-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745006"/>
        </criteria>
        <criterion comment="dovecot-mysql is earlier than 1:2.0.9-23.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634573745007"/>
        <criteria operator="AND">
          <criterion comment="dovecot-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745008"/>
          <criterion comment="dovecot-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745009"/>
        </criteria>
        <criterion comment="dovecot-pgsql is earlier than 1:2.0.9-23.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634573745010"/>
        <criteria operator="AND">
          <criterion comment="dovecot-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745011"/>
          <criterion comment="dovecot-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745012"/>
        </criteria>
        <criterion comment="dovecot-pigeonhole is earlier than 1:2.0.9-23.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634573745013"/>
        <criteria operator="AND">
          <criterion comment="dovecot-pigeonhole isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745014"/>
          <criterion comment="dovecot-pigeonhole isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1635439636" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2017-6363, CVE-2021-40145</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1635439636" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1635439636" source="CLSA"/>
        <reference ref_id="CVE-2021-40145" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-40145" source="CVE"/>
        <reference ref_id="CVE-2017-6363" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-6363" source="CVE"/>
        <description>- CVE-2021-40145: check for memory allocation errors processing GD2 images
- CVE-2017-6363: make sure transparent index is within bounds of the palette</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-28"/>
          <updated date="2021-10-28"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2021-40145" impact="important" public="20210826">CVE-2021-40145</cve>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:P/I:N/A:P" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-6363" impact="important" public="20200227">CVE-2017-6363</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="gd is earlier than 0:2.0.35-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1635439636001"/>
        <criteria operator="AND">
          <criterion comment="gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1635439636002"/>
          <criterion comment="gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1635439636003"/>
        </criteria>
        <criterion comment="gd-devel is earlier than 0:2.0.35-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1635439636004"/>
        <criteria operator="AND">
          <criterion comment="gd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1635439636005"/>
          <criterion comment="gd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1635439636006"/>
        </criteria>
        <criterion comment="gd-progs is earlier than 0:2.0.35-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1635439636007"/>
        <criteria operator="AND">
          <criterion comment="gd-progs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1635439636008"/>
          <criterion comment="gd-progs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1635439636009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1623075923" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-28153</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1623075923" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1623075923" source="CLSA"/>
        <reference ref_id="CVE-2021-27219" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-27219" source="CVE"/>
        <reference ref_id="CVE-2021-28153" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-28153" source="CVE"/>
        <description>- Fixed CVE-2021-28153: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION
  creates empty target for dangling symlink</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-06-07"/>
          <updated date="2021-06-07"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-681" href="https://cve.tuxcare.com/els/cve/CVE-2021-27219" impact="important" public="20210215">CVE-2021-27219</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-59" href="https://cve.tuxcare.com/els/cve/CVE-2021-28153" impact="moderate" public="20210311">CVE-2021-28153</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glib2 is earlier than 0:2.28.8-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075923001"/>
        <criteria operator="AND">
          <criterion comment="glib2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923002"/>
          <criterion comment="glib2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923003"/>
        </criteria>
        <criterion comment="glib2-devel is earlier than 0:2.28.8-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075923004"/>
        <criteria operator="AND">
          <criterion comment="glib2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923005"/>
          <criterion comment="glib2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923006"/>
        </criteria>
        <criterion comment="glib2-doc is earlier than 0:2.28.8-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075923007"/>
        <criteria operator="AND">
          <criterion comment="glib2-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923008"/>
          <criterion comment="glib2-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923009"/>
        </criteria>
        <criterion comment="glib2-static is earlier than 0:2.28.8-12.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1623075923010"/>
        <criteria operator="AND">
          <criterion comment="glib2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923011"/>
          <criterion comment="glib2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1642084196" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3800</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1642084196" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1642084196" source="CLSA"/>
        <reference ref_id="CVE-2021-3800" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3800" source="CVE"/>
        <description>- CVE-2021-3800: Fix privilege escalation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-01-13"/>
          <updated date="2022-01-13"/>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-200" href="https://cve.tuxcare.com/els/cve/CVE-2021-3800" impact="moderate" public="20210304">CVE-2021-3800</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1642084196001"/>
        <criteria operator="AND">
          <criterion comment="glib2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923002"/>
          <criterion comment="glib2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923003"/>
        </criteria>
        <criterion comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1642084196002"/>
        <criteria operator="AND">
          <criterion comment="glib2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923005"/>
          <criterion comment="glib2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923006"/>
        </criteria>
        <criterion comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1642084196003"/>
        <criteria operator="AND">
          <criterion comment="glib2-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923008"/>
          <criterion comment="glib2-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923009"/>
        </criteria>
        <criterion comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1642084196004"/>
        <criteria operator="AND">
          <criterion comment="glib2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923011"/>
          <criterion comment="glib2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1629395067" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-33574, CVE-2021-35942, CVE-2021-38604</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1629395067" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1629395067" source="CLSA"/>
        <reference ref_id="CVE-2021-33574" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-33574" source="CVE"/>
        <reference ref_id="CVE-2021-38604" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-38604" source="CVE"/>
        <reference ref_id="CVE-2021-35942" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35942" source="CVE"/>
        <description>- Adopt pthread_attr_copy functionality, test case is included
- CVE-2021-33574: avoid use-after-free vulnerability
- CVE-2021-35942: avoid out-of-bounds read via
  signed integer overflow in array index
- CVE-2021-38604: considered. No NULL pointer dereference is possible</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-08-19"/>
          <updated date="2021-08-19"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-33574" impact="critical" public="20210525">CVE-2021-33574</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2021-38604" impact="important" public="20210812">CVE-2021-38604</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2021-35942" impact="critical" public="20210722">CVE-2021-35942</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067004"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067007"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067010"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067013"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067016"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.213.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629395067019"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1637583639" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3326, CVE-2021-43396</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1637583639" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1637583639" source="CLSA"/>
        <reference ref_id="CVE-2021-43396" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-43396" source="CVE"/>
        <reference ref_id="CVE-2021-3326" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3326" source="CVE"/>
        <description>- CVE-2021-3326: avoid denial of service due to a failed assertion
- CVE-2021-43396: check actual stored character in state reset code</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-11-22"/>
          <updated date="2021-11-22"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-43396" impact="important" public="20211104">CVE-2021-43396</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2021-3326" impact="important" public="20210127">CVE-2021-3326</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637583639007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1643818516" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-23218, CVE-2022-23219</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1643818516" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1643818516" source="CLSA"/>
        <reference ref_id="CVE-2022-23218" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23218" source="CVE"/>
        <reference ref_id="CVE-2022-23219" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23219" source="CVE"/>
        <description>- CVE-2022-23218: fix possible buffer overflow in svcunix_create
- CVE-2022-23219: fix possible buffer overflow in clnt_create</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-02-02"/>
          <updated date="2022-02-02"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2022-23218" impact="critical" public="20220114">CVE-2022-23218</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2022-23219" impact="critical" public="20220114">CVE-2022-23219</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643818516007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1648138117" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3999</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1648138117" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1648138117" source="CLSA"/>
        <reference ref_id="CVE-2021-3999" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3999" source="CVE"/>
        <description>- CVE-2021-3999: fix single byte buffer overflow and overflow in getcwd</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-24"/>
          <updated date="2022-03-24"/>
          <cve cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-193" href="https://cve.tuxcare.com/els/cve/CVE-2021-3999" impact="important" public="20220111">CVE-2021-3999</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1648138117007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1624372464" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3504</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1624372464" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1624372464" source="CLSA"/>
        <reference ref_id="CVE-2021-3504" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3504" source="CVE"/>
        <description>- Bounds check for block exceeding page length (CVE-2021-3504)
resolves: rhbz#1950500</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-06-22"/>
          <updated date="2021-06-22"/>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:P/I:N/A:P" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-3504" impact="moderate" public="20210511">CVE-2021-3504</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1624372464001"/>
        <criteria operator="AND">
          <criterion comment="hivex isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1624372464002"/>
          <criterion comment="hivex isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1624372464003"/>
        </criteria>
        <criterion comment="hivex-devel is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1624372464004"/>
        <criteria operator="AND">
          <criterion comment="hivex-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1624372464005"/>
          <criterion comment="hivex-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1624372464006"/>
        </criteria>
        <criterion comment="ocaml-hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1624372464007"/>
        <criteria operator="AND">
          <criterion comment="ocaml-hivex isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1624372464008"/>
          <criterion comment="ocaml-hivex isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1624372464009"/>
        </criteria>
        <criterion comment="ocaml-hivex-devel is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1624372464010"/>
        <criteria operator="AND">
          <criterion comment="ocaml-hivex-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1624372464011"/>
          <criterion comment="ocaml-hivex-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1624372464012"/>
        </criteria>
        <criterion comment="perl-hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1624372464013"/>
        <criteria operator="AND">
          <criterion comment="perl-hivex isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1624372464014"/>
          <criterion comment="perl-hivex isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1624372464015"/>
        </criteria>
        <criterion comment="python-hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1624372464016"/>
        <criteria operator="AND">
          <criterion comment="python-hivex isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1624372464017"/>
          <criterion comment="python-hivex isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1624372464018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650576075" version="1">
      <metadata>
        <title>Fix of 13 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650576075" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650576075" source="CLSA"/>
        <reference ref_id="CVE-2021-3347" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3347" source="CVE"/>
        <description>- CKSIX-267: USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
- CKSIX-267: CVE-2019-14615: drm/i915/gen9: Clear residual context state on context switch 
- CKSIX-267: CVE-2020-8647, CVE-2020-8649: vgacon: Fix a UAF in vgacon_invert_region
- CKSIX-267: CVE-2020-14331: vgacon: Fix for missing check in scrollback handling
- CKSIX-268: CVE-2021-3347: futex: Handle faults correctly for PI futexes
- CKSIX-268: CVE-2021-3347: futex: Provide and use pi_state_update_owner()
- CKSIX-263: KEYS: allow reaching the keys quotas exactly
- CKSIX-263: KEYS: reaching the keys quotas correctly
- CKSIX-263: fix -ENOMEM result with invalid user space pointer in sendto() syscall
- CKSIX-263: CVE-2017-18344: posix-timer: Properly check sigevent-&gt;sigev_notify
- CKSIX-263: CVE-2018-6927: futex: Prevent overflow by strengthen input validation
- CKSIX-258: CVE-2017-6951: KEYS: Change the name of the dead type to ".dead" to prevent user access
- CKSIX-258: CVE-2017-15299: KEYS: don't let add_key() update an uninstantiated key
- CKSIX-258: fix CVE-2016-9604
- CKSIX-258: KEYS: add missing permission check for request_key() destination
- CKSIX-258: CVE-2017-10661: timerfd: Protect the might cancel mechanism proper
- CKSIX-258: fix CVE-2017-7472
- CKSIX-258: fix CVE-2017-15274</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-21"/>
          <updated date="2022-04-21"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-3347" impact="important" public="20210129">CVE-2021-3347</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.2.el6 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1650576075001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075008"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075011"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075014"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075017"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075020"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.2.el6" test_ref="oval:com.tuxcare.clsa:tst:1650576075023"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261664" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-27364, CVE-2021-27363, CVE-2021-27365</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261664" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261664" source="CLSA"/>
        <reference ref_id="CVE-2021-27364" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-27364" source="CVE"/>
        <reference ref_id="CVE-2021-27363" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-27363" source="CVE"/>
        <reference ref_id="CVE-2021-27365" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-27365" source="CVE"/>
        <description>- CVE-2021-27365: scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE
- CVE-2021-27365: scsi: iscsi: Verify lengths on passthrough PDUs
- CVE-2021-27363: CVE-2021-27364: scsi: iscsi: Restrict sessions and handles to admin capabilities
- sysfs: Add sysfs_emit and sysfs_emit_at to format sysfs output</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="3.6/AV:L/AC:L/Au:N/C:P/I:N/A:P" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-27364" impact="important" public="20210307">CVE-2021-27364</cve>
          <cve cvss2="3.6/AV:L/AC:L/Au:N/C:P/I:N/A:P" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-27363" impact="moderate" public="20210307">CVE-2021-27363</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-27365" impact="important" public="20210307">CVE-2021-27365</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.3.el6 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1632261664001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664006"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664007"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664008"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.3.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261664009"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261839" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-29661, CVE-2019-19532, CVE-2020-25656, CVE-2020-25211</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261839" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261839" source="CLSA"/>
        <reference ref_id="CVE-2020-29661" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-29661" source="CVE"/>
        <description>- CKSIX-277: CVE-2020-29661: tty: Fix -&gt;pgrp locking in tiocspgrp()
- CKSIX-277: CVE-2020-25656: vt: keyboard, extend func_buf_lock to readers
- CKSIX-277: CVE-2020-25656: tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- CKSIX-277: CVE-2020-25656: vt: keyboard, simplify vt_kdgkbsent
- CKSIX-277: CVE-2020-25211: netfilter: ctnetlink: add a range check for l3/l4 protonum
- CKSIX-277: CKSIX-276: CVE-2019-19532: HID: Fix assumption that devices have inputs</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-29661" impact="important" public="20201209">CVE-2020-29661</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.5.el6 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1632261839001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.5.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261839008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261912" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-22555</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261912" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261912" source="CLSA"/>
        <reference ref_id="CVE-2021-22555" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-22555" source="CVE"/>
        <description>- ELS-130: CVE-2021-22555: netfilter: x_tables: fix compat match/target pad out-of-bound write</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-22555" impact="important" public="20210707">CVE-2021-22555</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.6.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261912001"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.6.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261912004"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.6.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261912007"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261987" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-33909</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261987" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261987" source="CLSA"/>
        <reference ref_id="CVE-2021-33909" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-33909" source="CVE"/>
        <description>- ELS-130: netfilter: x_tables: add missing tables zeroing
- CLKRN-800: CVE-2021-33909: seq_file: disallow extremely large seq buffer allocation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2021-33909" impact="important" public="20210720">CVE-2021-33909</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.7.el6 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1632261987001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.7.el6" test_ref="oval:com.tuxcare.clsa:tst:1632261987008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632262296" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-38160, CVE-2021-3573, CVE-2021-38205, CVE-2021-3178, CVE-2021-20265, CVE-2021-3612, CVE-2021-32399, CVE-2021-37159, CVE-2014-4508, CVE-2021-28972, CVE-2021-34693, CVE-2021-20292</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632262296" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632262296" source="CLSA"/>
        <reference ref_id="CVE-2021-28972" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-28972" source="CVE"/>
        <reference ref_id="CVE-2014-4508" ref_url="https://cve.tuxcare.com/els/cve/CVE-2014-4508" source="CVE"/>
        <reference ref_id="CVE-2021-3612" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3612" source="CVE"/>
        <reference ref_id="CVE-2021-3178" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3178" source="CVE"/>
        <reference ref_id="CVE-2021-38205" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-38205" source="CVE"/>
        <reference ref_id="CVE-2021-20265" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-20265" source="CVE"/>
        <reference ref_id="CVE-2021-38160" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-38160" source="CVE"/>
        <reference ref_id="CVE-2021-37159" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-37159" source="CVE"/>
        <reference ref_id="CVE-2021-32399" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-32399" source="CVE"/>
        <reference ref_id="CVE-2021-20292" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-20292" source="CVE"/>
        <reference ref_id="CVE-2021-34693" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-34693" source="CVE"/>
        <reference ref_id="CVE-2021-3573" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3573" source="CVE"/>
        <description>- ELSCVE-666: CVE-2021-34693: can: bcm: fix infoleak in struct bcm_msg_head
- ELSCVE-705: CVE-2021-38160: virtio_console: Assure used length from device is limited
- ELSCVE-769: CVE-2014-4508: x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)
- ELSCVE-844: CVE-2021-3573: Bluetooth: use correct lock to prevent UAF of hdev object
- ELSCVE-503: CVE-2021-32399: bluetooth: eliminate the potential race condition when  removing the HCI controller
- ELSCVE-451: CVE-2021-37159: hso: fix a use after free condition
- ELSCVE-387: CVE-2021-38205: net: xilinx_emaclite: Do not print real IOMEM pointer
- ELSCVE-547: CVE-2021-3178: nfsd4: readdirplus shouldn't return parent of export
- ELSCVE-547: nfsd: fix compose_entry_fh() failure exits
- ELSCVE-547: nfsd: make local functions static
- ELSCVE-682: CVE-2021-20265: af_unix: fix struct pid memory leak
- ELSCVE-531: CVE-2021-20292: drm/ttm/nouveau: don't call tt destroy callback on alloc failure.
- ELSCVE-543: CVE-2021-28972: PCI: rpadlpar: Fix potential drc_name corruption in store functions
- ELSCVE-575: CVE-2021-3612: Input: joydev - prevent use of not validated data in JSIOCSBTNMAP ioctl
- ELSCVE-575: Input: joydev - prevent potential read overflow in ioctl
- ELSCVE-575: Input: joydev - fix possible ERR_PTR() dereferencing
- ELSCVE-575: Input: joydev - use memdup_user() to duplicate memory from user-space</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2021-28972" impact="moderate" public="20210322">CVE-2021-28972</cve>
          <cve cvss2="4.7/AV:L/AC:M/Au:N/C:N/I:N/A:C" cwe="CWE-189" href="https://cve.tuxcare.com/els/cve/CVE-2014-4508" impact="moderate" public="20140623">CVE-2014-4508</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-3612" impact="important" public="20210709">CVE-2021-3612</cve>
          <cve cvss2="5.5/AV:N/AC:L/Au:S/C:P/I:P/A:N" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els/cve/CVE-2021-3178" impact="moderate" public="20210119">CVE-2021-3178</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:N/I:P/A:N" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-824" href="https://cve.tuxcare.com/els/cve/CVE-2021-38205" impact="low" public="20210808">CVE-2021-38205</cve>
          <cve cvss2="4.9/AV:L/AC:L/Au:N/C:N/I:N/A:C" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2021-20265" impact="moderate" public="20210310">CVE-2021-20265</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2021-38160" impact="important" public="20210807">CVE-2021-38160</cve>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2021-37159" impact="moderate" public="20210721">CVE-2021-37159</cve>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2021-32399" impact="important" public="20210510">CVE-2021-32399</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-20292" impact="moderate" public="20210528">CVE-2021-20292</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-909" href="https://cve.tuxcare.com/els/cve/CVE-2021-34693" impact="moderate" public="20210614">CVE-2021-34693</cve>
          <cve cvss2="6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2021-3573" impact="moderate" public="20210813">CVE-2021-3573</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1632262296001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6" test_ref="oval:com.tuxcare.clsa:tst:1632262296008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650986589" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-0920, CVE-2022-0492, CVE-2020-0466, CVE-2021-4155</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650986589" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650986589" source="CLSA"/>
        <reference ref_id="CVE-2021-0920" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-0920" source="CVE"/>
        <reference ref_id="CVE-2020-0466" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-0466" source="CVE"/>
        <reference ref_id="CVE-2021-4155" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4155" source="CVE"/>
        <reference ref_id="CVE-2022-0492" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0492" source="CVE"/>
        <description>- cgroup-v1: Require capabilities to set release_agent [ELSCVE-3555] {CVE-2022-0492}
 - xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate [ELSCVE-3891] {CVE-2021-4155}
 - af_unix: fix garbage collect vs MSG_PEEK [ELSCVE-3728] {CVE-2021-0920}
 - epoll: Keep a reference on files added to the check list [ELSCVE-3890] {CVE-2020-0466}
 - Revert "cipso,calipso: resolve a number of problems with the DOI refcounts"</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-26"/>
          <updated date="2022-04-26"/>
          <cve cvss2="6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2021-0920" impact="moderate" public="20211215">CVE-2021-0920</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-0466" impact="important" public="20201214">CVE-2020-0466</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-131" href="https://cve.tuxcare.com/els/cve/CVE-2021-4155" impact="moderate" public="20220110">CVE-2021-4155</cve>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-287" href="https://cve.tuxcare.com/els/cve/CVE-2022-0492" impact="important" public="20220303">CVE-2022-0492</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1650986589001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1650986589008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650377052" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-28390, CVE-2021-3609</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650377052" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650377052" source="CLSA"/>
        <reference ref_id="CVE-2021-3655" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3655" source="CVE"/>
        <reference ref_id="CVE-2022-28390" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-28390" source="CVE"/>
        <reference ref_id="CVE-2020-36385" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36385" source="CVE"/>
        <reference ref_id="CVE-2021-4083" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4083" source="CVE"/>
        <reference ref_id="CVE-2021-3609" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3609" source="CVE"/>
        <reference ref_id="CVE-2021-31916" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-31916" source="CVE"/>
        <description>- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path [ELSCVE-3847] {CVE-2022-28390}&#13;
 - can: bcm: delay release of struct bcm_op after synchronize_rcu() [ELSCVE-1694] {CVE-2021-3609}&#13;
 - RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy [ELSCVE-2286] {CVE-2020-36385}&#13;
 - RDMA/ucma: Fix the locking of ctx-&gt;file [ELSCVE-2286] {CVE-2020-36385}&#13;
 - RDMA/cma: Add missing locking to rdma_accept() [ELSCVE-2286] {CVE-2020-36385}&#13;
 - RDMA/ucma: Put a lock around every call to the rdma_cm layer [ELSCVE-2286] {CVE-2020-36385}&#13;
 - sctp: validate chunk size in __rcv_asconf_lookup [ELSCVE-713] {CVE-2021-3655}&#13;
 - sctp: fix return value check in __sctp_rcv_asconf_lookup [ELSCVE-713] {CVE-2021-3655}&#13;
 - add size validation when walking chunks [ELSCVE-713] {CVE-2021-3655}&#13;
 - sctp: validate from_addr_param return [ELSCVE-713] {CVE-2021-3655}&#13;
 - sctp: fully initialize v4 addr in some functions [ELSCVE-713] {CVE-2021-3655}&#13;
 - sctp: simplify addr copy [ELSCVE-713] {CVE-2021-3655}&#13;
 - dm ioctl: fix out of bounds array access when no devices [ELSCVE-475] {CVE-2021-31916}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-19"/>
          <updated date="2022-04-19"/>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-909" href="https://cve.tuxcare.com/els/cve/CVE-2021-3655" impact="low" public="20210805">CVE-2021-3655</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2022-28390" impact="important" public="20220403">CVE-2022-28390</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-36385" impact="important" public="20210607">CVE-2020-36385</cve>
          <cve cvss2="6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-4083" impact="important" public="20220118">CVE-2021-4083</cve>
          <cve cvss2="6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2021-3609" impact="important" public="20220303">CVE-2021-3609</cve>
          <cve cvss2="6.1/AV:L/AC:L/Au:N/C:P/I:P/A:C" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-31916" impact="moderate" public="20210506">CVE-2021-31916</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1650377052001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1650377052008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1646060797" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-24407</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1646060797" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1646060797" source="CLSA"/>
        <reference ref_id="CVE-2022-24407" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-24407" source="CVE"/>
        <description>- CVE-2022-24407: Fix failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-02-28"/>
          <updated date="2022-02-28"/>
          <cve cvss2="6.5/AV:N/AC:L/Au:S/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://cve.tuxcare.com/els/cve/CVE-2022-24407" impact="important" public="20220224">CVE-2022-24407</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="cyrus-sasl is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797001"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797002"/>
          <criterion comment="cyrus-sasl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797003"/>
        </criteria>
        <criterion comment="cyrus-sasl-devel is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797004"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797005"/>
          <criterion comment="cyrus-sasl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797006"/>
        </criteria>
        <criterion comment="cyrus-sasl-gssapi is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797007"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-gssapi isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797008"/>
          <criterion comment="cyrus-sasl-gssapi isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797009"/>
        </criteria>
        <criterion comment="cyrus-sasl-ldap is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797010"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797011"/>
          <criterion comment="cyrus-sasl-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797012"/>
        </criteria>
        <criterion comment="cyrus-sasl-lib is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797013"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-lib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797014"/>
          <criterion comment="cyrus-sasl-lib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797015"/>
        </criteria>
        <criterion comment="cyrus-sasl-md5 is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797016"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-md5 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797017"/>
          <criterion comment="cyrus-sasl-md5 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797018"/>
        </criteria>
        <criterion comment="cyrus-sasl-ntlm is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797019"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-ntlm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797020"/>
          <criterion comment="cyrus-sasl-ntlm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797021"/>
        </criteria>
        <criterion comment="cyrus-sasl-plain is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797022"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-plain isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797023"/>
          <criterion comment="cyrus-sasl-plain isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797024"/>
        </criteria>
        <criterion comment="cyrus-sasl-sql is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1646060797025"/>
        <criteria operator="AND">
          <criterion comment="cyrus-sasl-sql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1646060797026"/>
          <criterion comment="cyrus-sasl-sql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1646060797027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1642429400" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-4104</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1642429400" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1642429400" source="CLSA"/>
        <reference ref_id="CVE-2021-4104" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4104" source="CVE"/>
        <description>- CVE-2021-4104: Fix remote code execution vulnerability</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-01-17"/>
          <updated date="2022-01-17"/>
          <cve cvss2="6.0/AV:N/AC:M/Au:S/C:P/I:P/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://cve.tuxcare.com/els/cve/CVE-2021-4104" impact="important" public="20211214">CVE-2021-4104</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1642429400001"/>
        <criteria operator="AND">
          <criterion comment="log4j isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400002"/>
          <criterion comment="log4j isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400003"/>
        </criteria>
        <criterion comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1642429400004"/>
        <criteria operator="AND">
          <criterion comment="log4j-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400005"/>
          <criterion comment="log4j-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400006"/>
        </criteria>
        <criterion comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1642429400007"/>
        <criteria operator="AND">
          <criterion comment="log4j-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400008"/>
          <criterion comment="log4j-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1643918500" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-23305</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1643918500" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1643918500" source="CLSA"/>
        <reference ref_id="CVE-2022-23305" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23305" source="CVE"/>
        <description>- CVE-2022-23305: disable JDBCAppender by default. Add optional parameter for
  enabling it.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-02-03"/>
          <updated date="2022-02-03"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://cve.tuxcare.com/els/cve/CVE-2022-23305" impact="critical" public="20220118">CVE-2022-23305</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1643918500001"/>
        <criteria operator="AND">
          <criterion comment="log4j isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400002"/>
          <criterion comment="log4j isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400003"/>
        </criteria>
        <criterion comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1643918500002"/>
        <criteria operator="AND">
          <criterion comment="log4j-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400005"/>
          <criterion comment="log4j-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400006"/>
        </criteria>
        <criterion comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1643918500003"/>
        <criteria operator="AND">
          <criterion comment="log4j-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400008"/>
          <criterion comment="log4j-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1644500972" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-23307, CVE-2022-23302</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1644500972" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1644500972" source="CLSA"/>
        <reference ref_id="CVE-2022-23307" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23307" source="CVE"/>
        <reference ref_id="CVE-2022-23302" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23302" source="CVE"/>
        <description>- CVE-2022-23307: Fix Unsafe deserialization flaw in Chainsaw log viewer
- CVE-2022-23302: Fix remote code execution when application is configured to use JMSSink</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-02-10"/>
          <updated date="2022-02-10"/>
          <cve cvss2="9.0/AV:N/AC:L/Au:S/C:C/I:C/A:C" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://cve.tuxcare.com/els/cve/CVE-2022-23307" impact="important" public="20220118">CVE-2022-23307</cve>
          <cve cvss2="6.0/AV:N/AC:M/Au:S/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://cve.tuxcare.com/els/cve/CVE-2022-23302" impact="important" public="20220118">CVE-2022-23302</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1644500972001"/>
        <criteria operator="AND">
          <criterion comment="log4j isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400002"/>
          <criterion comment="log4j isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400003"/>
        </criteria>
        <criterion comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1644500972002"/>
        <criteria operator="AND">
          <criterion comment="log4j-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400005"/>
          <criterion comment="log4j-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400006"/>
        </criteria>
        <criterion comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1644500972003"/>
        <criteria operator="AND">
          <criterion comment="log4j-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400008"/>
          <criterion comment="log4j-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1655843011" version="1">
      <metadata>
        <title>Fixed CVE-2019-17571 in log4j</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1655843011" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1655843011" source="CLSA"/>
        <reference ref_id="CVE-2019-17571" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-17571" source="CVE"/>
        <description>- CVE-2019-17571: Fix the deserialization of untrusted data in SocketServer
  that allows an attacker to remotely execute arbitrary code</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-21"/>
          <updated date="2022-06-21"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-502" href="https://cve.tuxcare.com/els/cve/CVE-2019-17571" impact="critical" public="20191220">CVE-2019-17571</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1655843011001"/>
        <criteria operator="AND">
          <criterion comment="log4j isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400002"/>
          <criterion comment="log4j isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400003"/>
        </criteria>
        <criterion comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1655843011002"/>
        <criteria operator="AND">
          <criterion comment="log4j-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400005"/>
          <criterion comment="log4j-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400006"/>
        </criteria>
        <criterion comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1655843011003"/>
        <criteria operator="AND">
          <criterion comment="log4j-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1642429400008"/>
          <criterion comment="log4j-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1642429400009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261762" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-23017</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261762" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261762" source="CLSA"/>
        <reference ref_id="CVE-2021-23017" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-23017" source="CVE"/>
        <description>- Update fix for CVE-2021-23017 accoding nginx.org recomendations</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" cwe="CWE-193" href="https://cve.tuxcare.com/els/cve/CVE-2021-23017" impact="critical" public="20210601">CVE-2021-23017</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nginx is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762001"/>
        <criteria operator="AND">
          <criterion comment="nginx isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762002"/>
          <criterion comment="nginx isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762003"/>
        </criteria>
        <criterion comment="nginx-all-modules is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762004"/>
        <criteria operator="AND">
          <criterion comment="nginx-all-modules isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762005"/>
          <criterion comment="nginx-all-modules isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762006"/>
        </criteria>
        <criterion comment="nginx-filesystem is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762007"/>
        <criteria operator="AND">
          <criterion comment="nginx-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762008"/>
          <criterion comment="nginx-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762009"/>
        </criteria>
        <criterion comment="nginx-mod-http-geoip is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762010"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-geoip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762011"/>
          <criterion comment="nginx-mod-http-geoip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762012"/>
        </criteria>
        <criterion comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762013"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-image-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762014"/>
          <criterion comment="nginx-mod-http-image-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762015"/>
        </criteria>
        <criterion comment="nginx-mod-http-perl is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762016"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762017"/>
          <criterion comment="nginx-mod-http-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762018"/>
        </criteria>
        <criterion comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762019"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762020"/>
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762021"/>
        </criteria>
        <criterion comment="nginx-mod-mail is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762022"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-mail isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762023"/>
          <criterion comment="nginx-mod-mail isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762024"/>
        </criteria>
        <criterion comment="nginx-mod-stream is earlier than 0:1.10.3-3.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261762025"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-stream isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762026"/>
          <criterion comment="nginx-mod-stream isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1636378490" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2017-20005</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1636378490" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1636378490" source="CLSA"/>
        <reference ref_id="CVE-2017-20005" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-20005" source="CVE"/>
        <description>- CVE-2017-20005: fix buffer overflow for years that exceed four digits</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-11-08"/>
          <updated date="2021-11-08"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2017-20005" impact="critical" public="20210606">CVE-2017-20005</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nginx is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490001"/>
        <criteria operator="AND">
          <criterion comment="nginx isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762002"/>
          <criterion comment="nginx isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762003"/>
        </criteria>
        <criterion comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490002"/>
        <criteria operator="AND">
          <criterion comment="nginx-all-modules isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762005"/>
          <criterion comment="nginx-all-modules isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762006"/>
        </criteria>
        <criterion comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490003"/>
        <criteria operator="AND">
          <criterion comment="nginx-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762008"/>
          <criterion comment="nginx-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762009"/>
        </criteria>
        <criterion comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490004"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-geoip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762011"/>
          <criterion comment="nginx-mod-http-geoip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762012"/>
        </criteria>
        <criterion comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490005"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-image-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762014"/>
          <criterion comment="nginx-mod-http-image-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762015"/>
        </criteria>
        <criterion comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490006"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762017"/>
          <criterion comment="nginx-mod-http-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762018"/>
        </criteria>
        <criterion comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490007"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762020"/>
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762021"/>
        </criteria>
        <criterion comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490008"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-mail isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762023"/>
          <criterion comment="nginx-mod-mail isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762024"/>
        </criteria>
        <criterion comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1636378490009"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-stream isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762026"/>
          <criterion comment="nginx-mod-stream isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1649695619" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3618</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1649695619" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1649695619" source="CLSA"/>
        <reference ref_id="CVE-2021-3618" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3618" source="CVE"/>
        <description>- CVE-2021-3618: drop the connection after reaching the specified number of
  invalid protocol commmands</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-11"/>
          <updated date="2022-04-11"/>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:P/I:P/A:N" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-295" href="https://cve.tuxcare.com/els/cve/CVE-2021-3618" impact="important" public="20220323">CVE-2021-3618</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nginx is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619001"/>
        <criteria operator="AND">
          <criterion comment="nginx isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762002"/>
          <criterion comment="nginx isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762003"/>
        </criteria>
        <criterion comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619002"/>
        <criteria operator="AND">
          <criterion comment="nginx-all-modules isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762005"/>
          <criterion comment="nginx-all-modules isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762006"/>
        </criteria>
        <criterion comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619003"/>
        <criteria operator="AND">
          <criterion comment="nginx-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762008"/>
          <criterion comment="nginx-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762009"/>
        </criteria>
        <criterion comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619004"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-geoip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762011"/>
          <criterion comment="nginx-mod-http-geoip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762012"/>
        </criteria>
        <criterion comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619005"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-image-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762014"/>
          <criterion comment="nginx-mod-http-image-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762015"/>
        </criteria>
        <criterion comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619006"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762017"/>
          <criterion comment="nginx-mod-http-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762018"/>
        </criteria>
        <criterion comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619007"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762020"/>
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762021"/>
        </criteria>
        <criterion comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619008"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-mail isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762023"/>
          <criterion comment="nginx-mod-mail isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762024"/>
        </criteria>
        <criterion comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1649695619009"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-stream isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762026"/>
          <criterion comment="nginx-mod-stream isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1656962023" version="1">
      <metadata>
        <title>Fixed CVE-2016-10009 in openssh-5.3p1</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1656962023" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1656962023" source="CLSA"/>
        <reference ref_id="CVE-2016-10009" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-10009" source="CVE"/>
        <description>
- CVE-2016-10009: add whitelist of paths which may ssh-agent load from
  in order to prevent execution of arbitrary local pkcs#11</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-04"/>
          <updated date="2022-07-04"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-426" href="https://cve.tuxcare.com/els/cve/CVE-2016-10009" impact="important" public="20170105">CVE-2016-10009</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1656962023001"/>
        <criteria operator="AND">
          <criterion comment="openssh isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023002"/>
          <criterion comment="openssh isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023003"/>
        </criteria>
        <criterion comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1656962023004"/>
        <criteria operator="AND">
          <criterion comment="openssh-askpass isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023005"/>
          <criterion comment="openssh-askpass isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023006"/>
        </criteria>
        <criterion comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1656962023007"/>
        <criteria operator="AND">
          <criterion comment="openssh-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023008"/>
          <criterion comment="openssh-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023009"/>
        </criteria>
        <criterion comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1656962023010"/>
        <criteria operator="AND">
          <criterion comment="openssh-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023011"/>
          <criterion comment="openssh-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023012"/>
        </criteria>
        <criterion comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1656962023013"/>
        <criteria operator="AND">
          <criterion comment="openssh-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023014"/>
          <criterion comment="openssh-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023015"/>
        </criteria>
        <criterion comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1656962023016"/>
        <criteria operator="AND">
          <criterion comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023017"/>
          <criterion comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1657561632" version="1">
      <metadata>
        <title>Fixed CVEs in openssh-5.3p1: CVE-2016-10708, CVE-2016-10012</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1657561632" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1657561632" source="CLSA"/>
        <reference ref_id="CVE-2016-10708" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-10708" source="CVE"/>
        <description>
- CVE-2016-10708: fix crash in packet handling code by moving inbound NEWKEYS
  handling to kex layer
- CVE-2016-10012: abandon the fix due to compression mode issues</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-11"/>
          <updated date="2022-07-11"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2016-10708" impact="important" public="20180121">CVE-2016-10708</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1657561632001"/>
        <criteria operator="AND">
          <criterion comment="openssh isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023002"/>
          <criterion comment="openssh isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023003"/>
        </criteria>
        <criterion comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1657561632002"/>
        <criteria operator="AND">
          <criterion comment="openssh-askpass isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023005"/>
          <criterion comment="openssh-askpass isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023006"/>
        </criteria>
        <criterion comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1657561632003"/>
        <criteria operator="AND">
          <criterion comment="openssh-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023008"/>
          <criterion comment="openssh-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023009"/>
        </criteria>
        <criterion comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1657561632004"/>
        <criteria operator="AND">
          <criterion comment="openssh-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023011"/>
          <criterion comment="openssh-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023012"/>
        </criteria>
        <criterion comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1657561632005"/>
        <criteria operator="AND">
          <criterion comment="openssh-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023014"/>
          <criterion comment="openssh-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023015"/>
        </criteria>
        <criterion comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1657561632006"/>
        <criteria operator="AND">
          <criterion comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023017"/>
          <criterion comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1658171011" version="1">
      <metadata>
        <title>Fixed CVE-2016-10012 in openssh</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1658171011" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1658171011" source="CLSA"/>
        <reference ref_id="CVE-2016-10012" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-10012" source="CVE"/>
        <description>
- CVE-2016-10012: re-remove pre-authentication compression and potentially
  unsecure shared memory manager used by zlib
- Move not yet valid timestamps for certs to 2030-2040 range, make sure all
  tests are passed and add %check
unset DISPLAY
 section</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-18"/>
          <updated date="2022-07-18"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2016-10012" impact="important" public="20170105">CVE-2016-10012</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1658171011001"/>
        <criteria operator="AND">
          <criterion comment="openssh isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023002"/>
          <criterion comment="openssh isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023003"/>
        </criteria>
        <criterion comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1658171011002"/>
        <criteria operator="AND">
          <criterion comment="openssh-askpass isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023005"/>
          <criterion comment="openssh-askpass isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023006"/>
        </criteria>
        <criterion comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1658171011003"/>
        <criteria operator="AND">
          <criterion comment="openssh-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023008"/>
          <criterion comment="openssh-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023009"/>
        </criteria>
        <criterion comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1658171011004"/>
        <criteria operator="AND">
          <criterion comment="openssh-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023011"/>
          <criterion comment="openssh-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023012"/>
        </criteria>
        <criterion comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1658171011005"/>
        <criteria operator="AND">
          <criterion comment="openssh-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023014"/>
          <criterion comment="openssh-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023015"/>
        </criteria>
        <criterion comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1658171011006"/>
        <criteria operator="AND">
          <criterion comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023017"/>
          <criterion comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1633442934" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-11868</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1633442934" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1633442934" source="CLSA"/>
        <reference ref_id="CVE-2013-5211" ref_url="https://cve.tuxcare.com/els/cve/CVE-2013-5211" source="CVE"/>
        <reference ref_id="CVE-2020-11868" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-11868" source="CVE"/>
        <description>- CVE-2020-11868: incorrect handling of packets from unauthenticated
  synchronization source with spoofed IP address leads to denial of service.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-05"/>
          <updated date="2021-10-05"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2013-5211" impact="moderate" public="20140102">CVE-2013-5211</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-346" href="https://cve.tuxcare.com/els/cve/CVE-2020-11868" impact="important" public="20200417">CVE-2020-11868</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="ntp is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442934001"/>
        <criteria operator="AND">
          <criterion comment="ntp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934002"/>
          <criterion comment="ntp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934003"/>
        </criteria>
        <criterion comment="ntp-doc is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442934004"/>
        <criteria operator="AND">
          <criterion comment="ntp-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934005"/>
          <criterion comment="ntp-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934006"/>
        </criteria>
        <criterion comment="ntp-perl is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442934007"/>
        <criteria operator="AND">
          <criterion comment="ntp-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934008"/>
          <criterion comment="ntp-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934009"/>
        </criteria>
        <criterion comment="ntpdate is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442934010"/>
        <criteria operator="AND">
          <criterion comment="ntpdate isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934011"/>
          <criterion comment="ntpdate isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1608724134" version="1">
      <metadata>
        <title>Fix CVE: CVE-2020-1971</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2020:1608724134" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2020:1608724134" source="CLSA"/>
        <reference ref_id="CVE-2020-1971" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-1971" source="CVE"/>
        <description>EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2020-12-09"/>
          <updated date="2020-12-09"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2020-1971" impact="moderate" public="20201208">CVE-2020-1971</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724134001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724134004"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724134007"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1608724134010"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1614885634" version="1">
      <metadata>
        <title>Fix of CVE:CVE-2021-23841 </title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1614885634" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1614885634" source="CLSA"/>
        <reference ref_id="CVE-2021-23841" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-23841" source="CVE"/>
        <description>- Fix Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-03-03"/>
          <updated date="2021-03-03"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2021-23841" impact="moderate" public="20210216">CVE-2021-23841</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1614885634001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1614885634002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1614885634003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1614885634004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632261785" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-23840</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632261785" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632261785" source="CLSA"/>
        <reference ref_id="CVE-2021-23840" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-23840" source="CVE"/>
        <description>- Fixed integer overflow in CipherUpdate(CVE-2021-23840)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2021-23840" impact="important" public="20210216">CVE-2021-23840</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-61.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261785001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-61.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261785002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-61.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261785003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-61.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632261785004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632262317" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2018-0739, CVE-2018-0737, CVE-2021-3712, CVE-2018-0732</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632262317" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632262317" source="CLSA"/>
        <reference ref_id="CVE-2017-3735" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-3735" source="CVE"/>
        <reference ref_id="CVE-2021-3712" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3712" source="CVE"/>
        <reference ref_id="CVE-2018-0732" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-0732" source="CVE"/>
        <reference ref_id="CVE-2018-0739" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-0739" source="CVE"/>
        <reference ref_id="CVE-2018-0737" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-0737" source="CVE"/>
        <description>- fix CVE-2021-3712 - handling ASN.1 string as NULL
  terminated leads to read buffer overrun
- Port patches from oracle6els branch, original changelog entry:
- Oracle bug 28730228: backport CVE-2018-0732
- Oracle bug 28758493: backport CVE-2018-0737
- Merge upstream patch to fix CVE-2018-0739 
- Avoid out-of-bounds read. Fixes CVE 2017-3735. By Rich Salz
- sha256 is used for the RSA pairwise consistency test instead of sha1</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-3735" impact="moderate" public="20170828">CVE-2017-3735</cve>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:P/I:N/A:P" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-3712" impact="important" public="20210824">CVE-2021-3712</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-320" href="https://cve.tuxcare.com/els/cve/CVE-2018-0732" impact="important" public="20180612">CVE-2018-0732</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2018-0739" impact="moderate" public="20180327">CVE-2018-0739</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://cve.tuxcare.com/els/cve/CVE-2018-0737" impact="moderate" public="20180416">CVE-2018-0737</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-62.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262317001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-62.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262317002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-62.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262317003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-62.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262317004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1647550273" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0778</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1647550273" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1647550273" source="CLSA"/>
        <reference ref_id="CVE-2022-0778" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0778" source="CVE"/>
        <description>- CVE-2022-0778: Fix possible infinite loop in BN_mod_sqrt()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-18"/>
          <updated date="2022-03-18"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els/cve/CVE-2022-0778" impact="important" public="20220315">CVE-2022-0778</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647550273001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647550273002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647550273003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647550273004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1657817606" version="1">
      <metadata>
        <title>Fixed CVEs in openssl: CVE-2022-2068, CVE-2022-1292</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1657817606" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1657817606" source="CLSA"/>
        <reference ref_id="CVE-2022-1292" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1292" source="CVE"/>
        <reference ref_id="CVE-2022-2068" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2068" source="CVE"/>
        <description>- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
  command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-14"/>
          <updated date="2022-07-14"/>
          <cve cvss2="10.0/AV:N/AC:L/Au:N/C:C/I:C/A:C" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://cve.tuxcare.com/els/cve/CVE-2022-1292" impact="critical" public="20220503">CVE-2022-1292</cve>
          <cve cvss2="10.0/AV:N/AC:L/Au:N/C:C/I:C/A:C" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://cve.tuxcare.com/els/cve/CVE-2022-2068" impact="critical" public="20220621">CVE-2022-2068</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1657817606001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1657817606002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1657817606003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1657817606004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1657561005" version="1">
      <metadata>
        <title>Fixed CVE-2020-12723 in perl-5.10.1</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1657561005" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1657561005" source="CLSA"/>
        <reference ref_id="CVE-2020-12723" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-12723" source="CVE"/>
        <description>
- CVE-2020-12723: fix a buffer overflow caused by a crafted regular expression
  because of recursive S_study_chunk calls</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-11"/>
          <updated date="2022-07-11"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2020-12723" impact="important" public="20200605">CVE-2020-12723</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="perl is earlier than 4:5.10.1-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005001"/>
        <criteria operator="AND">
          <criterion comment="perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005002"/>
          <criterion comment="perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005003"/>
        </criteria>
        <criterion comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005004"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Extract isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005005"/>
          <criterion comment="perl-Archive-Extract isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005006"/>
        </criteria>
        <criterion comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005007"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Tar isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005008"/>
          <criterion comment="perl-Archive-Tar isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005009"/>
        </criteria>
        <criterion comment="perl-CGI is earlier than 0:3.51-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005010"/>
        <criteria operator="AND">
          <criterion comment="perl-CGI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005011"/>
          <criterion comment="perl-CGI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005012"/>
        </criteria>
        <criterion comment="perl-CPAN is earlier than 0:1.9402-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005013"/>
        <criteria operator="AND">
          <criterion comment="perl-CPAN isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005014"/>
          <criterion comment="perl-CPAN isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005015"/>
        </criteria>
        <criterion comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005016"/>
        <criteria operator="AND">
          <criterion comment="perl-CPANPLUS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005017"/>
          <criterion comment="perl-CPANPLUS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005018"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005019"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005020"/>
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005021"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005022"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005023"/>
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005024"/>
        </criteria>
        <criterion comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005025"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005026"/>
          <criterion comment="perl-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005027"/>
        </criteria>
        <criterion comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005028"/>
        <criteria operator="AND">
          <criterion comment="perl-Digest-SHA isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005029"/>
          <criterion comment="perl-Digest-SHA isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005030"/>
        </criteria>
        <criterion comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005031"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005032"/>
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005033"/>
        </criteria>
        <criterion comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005034"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-Embed isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005035"/>
          <criterion comment="perl-ExtUtils-Embed isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005036"/>
        </criteria>
        <criterion comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005037"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005038"/>
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005039"/>
        </criteria>
        <criterion comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005040"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005041"/>
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005042"/>
        </criteria>
        <criterion comment="perl-File-Fetch is earlier than 0:0.26-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005043"/>
        <criteria operator="AND">
          <criterion comment="perl-File-Fetch isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005044"/>
          <criterion comment="perl-File-Fetch isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005045"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005046"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Base isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005047"/>
          <criterion comment="perl-IO-Compress-Base isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005048"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005049"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005050"/>
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005051"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005052"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005053"/>
          <criterion comment="perl-IO-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005054"/>
        </criteria>
        <criterion comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005055"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005056"/>
          <criterion comment="perl-IO-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005057"/>
        </criteria>
        <criterion comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005058"/>
        <criteria operator="AND">
          <criterion comment="perl-IPC-Cmd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005059"/>
          <criterion comment="perl-IPC-Cmd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005060"/>
        </criteria>
        <criterion comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005061"/>
        <criteria operator="AND">
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005062"/>
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005063"/>
        </criteria>
        <criterion comment="perl-Log-Message is earlier than 1:0.02-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005064"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005065"/>
          <criterion comment="perl-Log-Message isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005066"/>
        </criteria>
        <criterion comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005067"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005068"/>
          <criterion comment="perl-Log-Message-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005069"/>
        </criteria>
        <criterion comment="perl-Module-Build is earlier than 1:0.3500-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005070"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Build isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005071"/>
          <criterion comment="perl-Module-Build isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005072"/>
        </criteria>
        <criterion comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005073"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-CoreList isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005074"/>
          <criterion comment="perl-Module-CoreList isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005075"/>
        </criteria>
        <criterion comment="perl-Module-Load is earlier than 1:0.16-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005076"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005077"/>
          <criterion comment="perl-Module-Load isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005078"/>
        </criteria>
        <criterion comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005079"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load-Conditional isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005080"/>
          <criterion comment="perl-Module-Load-Conditional isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005081"/>
        </criteria>
        <criterion comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005082"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Loaded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005083"/>
          <criterion comment="perl-Module-Loaded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005084"/>
        </criteria>
        <criterion comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005085"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Pluggable isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005086"/>
          <criterion comment="perl-Module-Pluggable isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005087"/>
        </criteria>
        <criterion comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005088"/>
        <criteria operator="AND">
          <criterion comment="perl-Object-Accessor isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005089"/>
          <criterion comment="perl-Object-Accessor isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005090"/>
        </criteria>
        <criterion comment="perl-Package-Constants is earlier than 1:0.02-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005091"/>
        <criteria operator="AND">
          <criterion comment="perl-Package-Constants isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005092"/>
          <criterion comment="perl-Package-Constants isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005093"/>
        </criteria>
        <criterion comment="perl-Params-Check is earlier than 1:0.26-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005094"/>
        <criteria operator="AND">
          <criterion comment="perl-Params-Check isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005095"/>
          <criterion comment="perl-Params-Check isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005096"/>
        </criteria>
        <criterion comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005097"/>
        <criteria operator="AND">
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005098"/>
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005099"/>
        </criteria>
        <criterion comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005100"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Escapes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005101"/>
          <criterion comment="perl-Pod-Escapes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005102"/>
        </criteria>
        <criterion comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005103"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005104"/>
          <criterion comment="perl-Pod-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005105"/>
        </criteria>
        <criterion comment="perl-Term-UI is earlier than 0:0.20-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005106"/>
        <criteria operator="AND">
          <criterion comment="perl-Term-UI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005107"/>
          <criterion comment="perl-Term-UI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005108"/>
        </criteria>
        <criterion comment="perl-Test-Harness is earlier than 0:3.17-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005109"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Harness isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005110"/>
          <criterion comment="perl-Test-Harness isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005111"/>
        </criteria>
        <criterion comment="perl-Test-Simple is earlier than 0:0.92-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005112"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005113"/>
          <criterion comment="perl-Test-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005114"/>
        </criteria>
        <criterion comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005115"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-HiRes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005116"/>
          <criterion comment="perl-Time-HiRes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005117"/>
        </criteria>
        <criterion comment="perl-Time-Piece is earlier than 0:1.15-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005118"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-Piece isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005119"/>
          <criterion comment="perl-Time-Piece isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005120"/>
        </criteria>
        <criterion comment="perl-core is earlier than 0:5.10.1-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005121"/>
        <criteria operator="AND">
          <criterion comment="perl-core isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005122"/>
          <criterion comment="perl-core isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005123"/>
        </criteria>
        <criterion comment="perl-devel is earlier than 4:5.10.1-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005124"/>
        <criteria operator="AND">
          <criterion comment="perl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005125"/>
          <criterion comment="perl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005126"/>
        </criteria>
        <criterion comment="perl-libs is earlier than 4:5.10.1-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005127"/>
        <criteria operator="AND">
          <criterion comment="perl-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005128"/>
          <criterion comment="perl-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005129"/>
        </criteria>
        <criterion comment="perl-parent is earlier than 1:0.221-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005130"/>
        <criteria operator="AND">
          <criterion comment="perl-parent isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005131"/>
          <criterion comment="perl-parent isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005132"/>
        </criteria>
        <criterion comment="perl-suidperl is earlier than 4:5.10.1-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005133"/>
        <criteria operator="AND">
          <criterion comment="perl-suidperl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005134"/>
          <criterion comment="perl-suidperl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005135"/>
        </criteria>
        <criterion comment="perl-version is earlier than 3:0.77-146.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1657561005136"/>
        <criteria operator="AND">
          <criterion comment="perl-version isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005137"/>
          <criterion comment="perl-version isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005138"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632328234" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-10878</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632328234" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632328234" source="CLSA"/>
        <reference ref_id="CVE-2020-10878" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-10878" source="CVE"/>
        <description>
- CVE-2020-10878: fix integer overflow leading to RCE</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-22"/>
          <updated date="2021-09-22"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-10878" impact="important" public="20200605">CVE-2020-10878</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="perl is earlier than 4:5.10.1-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234001"/>
        <criteria operator="AND">
          <criterion comment="perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005002"/>
          <criterion comment="perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005003"/>
        </criteria>
        <criterion comment="perl-Archive-Extract is earlier than 1:0.38-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234002"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Extract isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005005"/>
          <criterion comment="perl-Archive-Extract isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005006"/>
        </criteria>
        <criterion comment="perl-Archive-Tar is earlier than 0:1.58-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234003"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Tar isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005008"/>
          <criterion comment="perl-Archive-Tar isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005009"/>
        </criteria>
        <criterion comment="perl-CGI is earlier than 0:3.51-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234004"/>
        <criteria operator="AND">
          <criterion comment="perl-CGI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005011"/>
          <criterion comment="perl-CGI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005012"/>
        </criteria>
        <criterion comment="perl-CPAN is earlier than 0:1.9402-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234005"/>
        <criteria operator="AND">
          <criterion comment="perl-CPAN isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005014"/>
          <criterion comment="perl-CPAN isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005015"/>
        </criteria>
        <criterion comment="perl-CPANPLUS is earlier than 0:0.88-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234006"/>
        <criteria operator="AND">
          <criterion comment="perl-CPANPLUS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005017"/>
          <criterion comment="perl-CPANPLUS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005018"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234007"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005020"/>
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005021"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234008"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005023"/>
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005024"/>
        </criteria>
        <criterion comment="perl-Compress-Zlib is earlier than 0:2.021-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234009"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005026"/>
          <criterion comment="perl-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005027"/>
        </criteria>
        <criterion comment="perl-Digest-SHA is earlier than 1:5.47-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234010"/>
        <criteria operator="AND">
          <criterion comment="perl-Digest-SHA isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005029"/>
          <criterion comment="perl-Digest-SHA isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005030"/>
        </criteria>
        <criterion comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234011"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005032"/>
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005033"/>
        </criteria>
        <criterion comment="perl-ExtUtils-Embed is earlier than 0:1.28-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234012"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-Embed isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005035"/>
          <criterion comment="perl-ExtUtils-Embed isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005036"/>
        </criteria>
        <criterion comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234013"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005038"/>
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005039"/>
        </criteria>
        <criterion comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234014"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005041"/>
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005042"/>
        </criteria>
        <criterion comment="perl-File-Fetch is earlier than 0:0.26-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234015"/>
        <criteria operator="AND">
          <criterion comment="perl-File-Fetch isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005044"/>
          <criterion comment="perl-File-Fetch isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005045"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Base is earlier than 0:2.021-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234016"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Base isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005047"/>
          <criterion comment="perl-IO-Compress-Base isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005048"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234017"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005050"/>
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005051"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Zlib is earlier than 0:2.021-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234018"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005053"/>
          <criterion comment="perl-IO-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005054"/>
        </criteria>
        <criterion comment="perl-IO-Zlib is earlier than 1:1.09-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234019"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005056"/>
          <criterion comment="perl-IO-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005057"/>
        </criteria>
        <criterion comment="perl-IPC-Cmd is earlier than 1:0.56-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234020"/>
        <criteria operator="AND">
          <criterion comment="perl-IPC-Cmd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005059"/>
          <criterion comment="perl-IPC-Cmd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005060"/>
        </criteria>
        <criterion comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234021"/>
        <criteria operator="AND">
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005062"/>
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005063"/>
        </criteria>
        <criterion comment="perl-Log-Message is earlier than 1:0.02-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234022"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005065"/>
          <criterion comment="perl-Log-Message isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005066"/>
        </criteria>
        <criterion comment="perl-Log-Message-Simple is earlier than 0:0.04-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234023"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005068"/>
          <criterion comment="perl-Log-Message-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005069"/>
        </criteria>
        <criterion comment="perl-Module-Build is earlier than 1:0.3500-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234024"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Build isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005071"/>
          <criterion comment="perl-Module-Build isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005072"/>
        </criteria>
        <criterion comment="perl-Module-CoreList is earlier than 0:2.18-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234025"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-CoreList isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005074"/>
          <criterion comment="perl-Module-CoreList isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005075"/>
        </criteria>
        <criterion comment="perl-Module-Load is earlier than 1:0.16-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234026"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005077"/>
          <criterion comment="perl-Module-Load isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005078"/>
        </criteria>
        <criterion comment="perl-Module-Load-Conditional is earlier than 0:0.30-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234027"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load-Conditional isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005080"/>
          <criterion comment="perl-Module-Load-Conditional isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005081"/>
        </criteria>
        <criterion comment="perl-Module-Loaded is earlier than 1:0.02-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234028"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Loaded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005083"/>
          <criterion comment="perl-Module-Loaded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005084"/>
        </criteria>
        <criterion comment="perl-Module-Pluggable is earlier than 1:3.90-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234029"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Pluggable isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005086"/>
          <criterion comment="perl-Module-Pluggable isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005087"/>
        </criteria>
        <criterion comment="perl-Object-Accessor is earlier than 1:0.34-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234030"/>
        <criteria operator="AND">
          <criterion comment="perl-Object-Accessor isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005089"/>
          <criterion comment="perl-Object-Accessor isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005090"/>
        </criteria>
        <criterion comment="perl-Package-Constants is earlier than 1:0.02-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234031"/>
        <criteria operator="AND">
          <criterion comment="perl-Package-Constants isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005092"/>
          <criterion comment="perl-Package-Constants isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005093"/>
        </criteria>
        <criterion comment="perl-Params-Check is earlier than 1:0.26-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234032"/>
        <criteria operator="AND">
          <criterion comment="perl-Params-Check isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005095"/>
          <criterion comment="perl-Params-Check isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005096"/>
        </criteria>
        <criterion comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234033"/>
        <criteria operator="AND">
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005098"/>
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005099"/>
        </criteria>
        <criterion comment="perl-Pod-Escapes is earlier than 1:1.04-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234034"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Escapes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005101"/>
          <criterion comment="perl-Pod-Escapes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005102"/>
        </criteria>
        <criterion comment="perl-Pod-Simple is earlier than 1:3.13-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234035"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005104"/>
          <criterion comment="perl-Pod-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005105"/>
        </criteria>
        <criterion comment="perl-Term-UI is earlier than 0:0.20-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234036"/>
        <criteria operator="AND">
          <criterion comment="perl-Term-UI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005107"/>
          <criterion comment="perl-Term-UI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005108"/>
        </criteria>
        <criterion comment="perl-Test-Harness is earlier than 0:3.17-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234037"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Harness isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005110"/>
          <criterion comment="perl-Test-Harness isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005111"/>
        </criteria>
        <criterion comment="perl-Test-Simple is earlier than 0:0.92-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234038"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005113"/>
          <criterion comment="perl-Test-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005114"/>
        </criteria>
        <criterion comment="perl-Time-HiRes is earlier than 4:1.9721-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234039"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-HiRes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005116"/>
          <criterion comment="perl-Time-HiRes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005117"/>
        </criteria>
        <criterion comment="perl-Time-Piece is earlier than 0:1.15-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234040"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-Piece isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005119"/>
          <criterion comment="perl-Time-Piece isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005120"/>
        </criteria>
        <criterion comment="perl-core is earlier than 0:5.10.1-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234041"/>
        <criteria operator="AND">
          <criterion comment="perl-core isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005122"/>
          <criterion comment="perl-core isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005123"/>
        </criteria>
        <criterion comment="perl-devel is earlier than 4:5.10.1-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234042"/>
        <criteria operator="AND">
          <criterion comment="perl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005125"/>
          <criterion comment="perl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005126"/>
        </criteria>
        <criterion comment="perl-libs is earlier than 4:5.10.1-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234043"/>
        <criteria operator="AND">
          <criterion comment="perl-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005128"/>
          <criterion comment="perl-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005129"/>
        </criteria>
        <criterion comment="perl-parent is earlier than 1:0.221-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234044"/>
        <criteria operator="AND">
          <criterion comment="perl-parent isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005131"/>
          <criterion comment="perl-parent isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005132"/>
        </criteria>
        <criterion comment="perl-suidperl is earlier than 4:5.10.1-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234045"/>
        <criteria operator="AND">
          <criterion comment="perl-suidperl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005134"/>
          <criterion comment="perl-suidperl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005135"/>
        </criteria>
        <criterion comment="perl-version is earlier than 3:0.77-145.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328234046"/>
        <criteria operator="AND">
          <criterion comment="perl-version isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005137"/>
          <criterion comment="perl-version isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005138"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632328264" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-10543</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632328264" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632328264" source="CLSA"/>
        <reference ref_id="CVE-2020-10543" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-10543" source="CVE"/>
        <description>
- CVE-2020-10543: fix signed integer overflow leading to heap buffer overrun</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-22"/>
          <updated date="2021-09-22"/>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:N/I:P/A:P" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2020-10543" impact="important" public="20200605">CVE-2020-10543</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="perl is earlier than 4:5.10.1-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264001"/>
        <criteria operator="AND">
          <criterion comment="perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005002"/>
          <criterion comment="perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005003"/>
        </criteria>
        <criterion comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264002"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Extract isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005005"/>
          <criterion comment="perl-Archive-Extract isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005006"/>
        </criteria>
        <criterion comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264003"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Tar isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005008"/>
          <criterion comment="perl-Archive-Tar isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005009"/>
        </criteria>
        <criterion comment="perl-CGI is earlier than 0:3.51-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264004"/>
        <criteria operator="AND">
          <criterion comment="perl-CGI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005011"/>
          <criterion comment="perl-CGI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005012"/>
        </criteria>
        <criterion comment="perl-CPAN is earlier than 0:1.9402-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264005"/>
        <criteria operator="AND">
          <criterion comment="perl-CPAN isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005014"/>
          <criterion comment="perl-CPAN isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005015"/>
        </criteria>
        <criterion comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264006"/>
        <criteria operator="AND">
          <criterion comment="perl-CPANPLUS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005017"/>
          <criterion comment="perl-CPANPLUS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005018"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264007"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005020"/>
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005021"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264008"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005023"/>
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005024"/>
        </criteria>
        <criterion comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264009"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005026"/>
          <criterion comment="perl-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005027"/>
        </criteria>
        <criterion comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264010"/>
        <criteria operator="AND">
          <criterion comment="perl-Digest-SHA isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005029"/>
          <criterion comment="perl-Digest-SHA isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005030"/>
        </criteria>
        <criterion comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264011"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005032"/>
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005033"/>
        </criteria>
        <criterion comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264012"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-Embed isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005035"/>
          <criterion comment="perl-ExtUtils-Embed isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005036"/>
        </criteria>
        <criterion comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264013"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005038"/>
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005039"/>
        </criteria>
        <criterion comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264014"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005041"/>
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005042"/>
        </criteria>
        <criterion comment="perl-File-Fetch is earlier than 0:0.26-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264015"/>
        <criteria operator="AND">
          <criterion comment="perl-File-Fetch isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005044"/>
          <criterion comment="perl-File-Fetch isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005045"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264016"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Base isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005047"/>
          <criterion comment="perl-IO-Compress-Base isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005048"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264017"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005050"/>
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005051"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264018"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005053"/>
          <criterion comment="perl-IO-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005054"/>
        </criteria>
        <criterion comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264019"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005056"/>
          <criterion comment="perl-IO-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005057"/>
        </criteria>
        <criterion comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264020"/>
        <criteria operator="AND">
          <criterion comment="perl-IPC-Cmd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005059"/>
          <criterion comment="perl-IPC-Cmd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005060"/>
        </criteria>
        <criterion comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264021"/>
        <criteria operator="AND">
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005062"/>
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005063"/>
        </criteria>
        <criterion comment="perl-Log-Message is earlier than 1:0.02-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264022"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005065"/>
          <criterion comment="perl-Log-Message isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005066"/>
        </criteria>
        <criterion comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264023"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005068"/>
          <criterion comment="perl-Log-Message-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005069"/>
        </criteria>
        <criterion comment="perl-Module-Build is earlier than 1:0.3500-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264024"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Build isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005071"/>
          <criterion comment="perl-Module-Build isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005072"/>
        </criteria>
        <criterion comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264025"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-CoreList isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005074"/>
          <criterion comment="perl-Module-CoreList isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005075"/>
        </criteria>
        <criterion comment="perl-Module-Load is earlier than 1:0.16-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264026"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005077"/>
          <criterion comment="perl-Module-Load isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005078"/>
        </criteria>
        <criterion comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264027"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load-Conditional isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005080"/>
          <criterion comment="perl-Module-Load-Conditional isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005081"/>
        </criteria>
        <criterion comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264028"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Loaded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005083"/>
          <criterion comment="perl-Module-Loaded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005084"/>
        </criteria>
        <criterion comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264029"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Pluggable isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005086"/>
          <criterion comment="perl-Module-Pluggable isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005087"/>
        </criteria>
        <criterion comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264030"/>
        <criteria operator="AND">
          <criterion comment="perl-Object-Accessor isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005089"/>
          <criterion comment="perl-Object-Accessor isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005090"/>
        </criteria>
        <criterion comment="perl-Package-Constants is earlier than 1:0.02-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264031"/>
        <criteria operator="AND">
          <criterion comment="perl-Package-Constants isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005092"/>
          <criterion comment="perl-Package-Constants isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005093"/>
        </criteria>
        <criterion comment="perl-Params-Check is earlier than 1:0.26-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264032"/>
        <criteria operator="AND">
          <criterion comment="perl-Params-Check isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005095"/>
          <criterion comment="perl-Params-Check isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005096"/>
        </criteria>
        <criterion comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264033"/>
        <criteria operator="AND">
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005098"/>
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005099"/>
        </criteria>
        <criterion comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264034"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Escapes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005101"/>
          <criterion comment="perl-Pod-Escapes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005102"/>
        </criteria>
        <criterion comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264035"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005104"/>
          <criterion comment="perl-Pod-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005105"/>
        </criteria>
        <criterion comment="perl-Term-UI is earlier than 0:0.20-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264036"/>
        <criteria operator="AND">
          <criterion comment="perl-Term-UI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005107"/>
          <criterion comment="perl-Term-UI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005108"/>
        </criteria>
        <criterion comment="perl-Test-Harness is earlier than 0:3.17-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264037"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Harness isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005110"/>
          <criterion comment="perl-Test-Harness isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005111"/>
        </criteria>
        <criterion comment="perl-Test-Simple is earlier than 0:0.92-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264038"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005113"/>
          <criterion comment="perl-Test-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005114"/>
        </criteria>
        <criterion comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264039"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-HiRes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005116"/>
          <criterion comment="perl-Time-HiRes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005117"/>
        </criteria>
        <criterion comment="perl-Time-Piece is earlier than 0:1.15-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264040"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-Piece isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005119"/>
          <criterion comment="perl-Time-Piece isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005120"/>
        </criteria>
        <criterion comment="perl-core is earlier than 0:5.10.1-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264041"/>
        <criteria operator="AND">
          <criterion comment="perl-core isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005122"/>
          <criterion comment="perl-core isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005123"/>
        </criteria>
        <criterion comment="perl-devel is earlier than 4:5.10.1-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264042"/>
        <criteria operator="AND">
          <criterion comment="perl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005125"/>
          <criterion comment="perl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005126"/>
        </criteria>
        <criterion comment="perl-libs is earlier than 4:5.10.1-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264043"/>
        <criteria operator="AND">
          <criterion comment="perl-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005128"/>
          <criterion comment="perl-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005129"/>
        </criteria>
        <criterion comment="perl-parent is earlier than 1:0.221-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264044"/>
        <criteria operator="AND">
          <criterion comment="perl-parent isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005131"/>
          <criterion comment="perl-parent isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005132"/>
        </criteria>
        <criterion comment="perl-suidperl is earlier than 4:5.10.1-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264045"/>
        <criteria operator="AND">
          <criterion comment="perl-suidperl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005134"/>
          <criterion comment="perl-suidperl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005135"/>
        </criteria>
        <criterion comment="perl-version is earlier than 3:0.77-146.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632328264046"/>
        <criteria operator="AND">
          <criterion comment="perl-version isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005137"/>
          <criterion comment="perl-version isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005138"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1616001357" version="1">
      <metadata>
        <title>Security fix for CVE-2019-10160</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1616001357" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1616001357" source="CLSA"/>
        <reference ref_id="CVE-2019-10160" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-10160" source="CVE"/>
        <description>- Security fix for CVE-2019-10160
Resolves: rhbz#1716744</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-03-17"/>
          <updated date="2021-03-17"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-522" href="https://cve.tuxcare.com/els/cve/CVE-2019-10160" impact="critical" public="20190607">CVE-2019-10160</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-68.el6" test_ref="oval:com.tuxcare.clsa:tst:1616001357001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-68.el6" test_ref="oval:com.tuxcare.clsa:tst:1616001357004"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-68.el6" test_ref="oval:com.tuxcare.clsa:tst:1616001357007"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-68.el6" test_ref="oval:com.tuxcare.clsa:tst:1616001357010"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-68.el6" test_ref="oval:com.tuxcare.clsa:tst:1616001357013"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-68.el6" test_ref="oval:com.tuxcare.clsa:tst:1616001357016"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1633442879" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-26116, CVE-2020-8492, CVE-2018-20852, CVE-2020-27619</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1633442879" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1633442879" source="CLSA"/>
        <reference ref_id="CVE-2020-8492" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8492" source="CVE"/>
        <reference ref_id="CVE-2020-27619" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-27619" source="CVE"/>
        <reference ref_id="CVE-2020-26116" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-26116" source="CVE"/>
        <reference ref_id="CVE-2018-20852" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-20852" source="CVE"/>
        <description>- Add Oracle Linux distribution in platform.py
- CVE-2018-20852: Prefix dot in domain for proper subdomain validation
- CVE-2020-8492: Python allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client
- CVE-2020-26116: http.client allows CRLF injection if the attacker controls the HTTP request method
- CVE-2020-27619: Unsafe use of eval() on data retrieved via HTTP in the test suite</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-05"/>
          <updated date="2021-10-05"/>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2020-8492" impact="moderate" public="20200130">CVE-2020-8492</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2020-27619" impact="critical" public="20201022">CVE-2020-27619</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:P/A:N" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els/cve/CVE-2020-26116" impact="important" public="20200927">CVE-2020-26116</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2018-20852" impact="moderate" public="20190713">CVE-2018-20852</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442879001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442879002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442879003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442879004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442879005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442879006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1646665957" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0391</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1646665957" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1646665957" source="CLSA"/>
        <reference ref_id="CVE-2022-0391" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0391" source="CVE"/>
        <description>- CVE-2022-0391: Add stripping ASCII newline and tabs from the url by urllib.parse</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-07"/>
          <updated date="2022-03-07"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els/cve/CVE-2022-0391" impact="important" public="20220209">CVE-2022-0391</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1646665957001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1646665957002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1646665957003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1646665957004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1646665957005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1646665957006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1647958513" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3737</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1647958513" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1647958513" source="CLSA"/>
        <reference ref_id="CVE-2021-3737" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3737" source="CVE"/>
        <description>- CVE-2021-3737: Fix HTTP client infinite line reading (DoS) after receiving a '100 Continue' HTTP response</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-22"/>
          <updated date="2022-03-22"/>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2021-3737" impact="important" public="20220304">CVE-2021-3737</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647958513001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647958513002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647958513003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647958513004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647958513005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1647958513006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1658347112" version="1">
      <metadata>
        <title>Fixed CVE-2015-20170 in python</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1658347112" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1658347112" source="CLSA"/>
        <reference ref_id="CVE-2015-20107" ref_url="https://cve.tuxcare.com/els/cve/CVE-2015-20107" source="CVE"/>
        <description>- CVE-2015-20170: mailcap: findmatch() function does not sanitise the second
  argument allowing to inject shell commands</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-20"/>
          <updated date="2022-07-20"/>
          <cve cvss2="10.0/AV:N/AC:L/Au:N/C:C/I:C/A:C" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-77" href="https://cve.tuxcare.com/els/cve/CVE-2015-20107" impact="critical" public="20220413">CVE-2015-20107</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1658347112001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1658347112002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1658347112003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1658347112004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1658347112005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1658347112006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1637673193" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-21704, CVE-2021-21703, CVE-2021-21705</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1637673193" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1637673193" source="CLSA"/>
        <reference ref_id="CVE-2021-21703" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-21703" source="CVE"/>
        <reference ref_id="CVE-2021-21705" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-21705" source="CVE"/>
        <reference ref_id="CVE-2021-21704" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-21704" source="CVE"/>
        <description>- CVE-2021-21704: fix integer overflow and subsequent incorrect buffer allocation
- CVE-2021-21705: fix incorrect url password validation
- CVE-2021-21703: fix incorrect shared memory management, which led to priv escalation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-11-23"/>
          <updated date="2021-11-23"/>
          <cve cvss2="6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-21703" impact="important" public="20211025">CVE-2021-21703</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2021-21705" impact="moderate" public="20211004">CVE-2021-21705</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2021-21704" impact="moderate" public="20211004">CVE-2021-21704</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193004"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193007"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193010"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193013"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193016"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193019"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193022"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193025"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193028"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193031"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193034"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193037"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193040"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193043"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193046"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193049"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193052"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193055"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193058"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193061"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193064"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193067"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193070"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193073"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193076"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673193079"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1658171149" version="1">
      <metadata>
        <title>Fixed CVE-2022-31625 in php</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1658171149" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1658171149" source="CLSA"/>
        <reference ref_id="CVE-2022-31625" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-31625" source="CVE"/>
        <description>- ELS-189: Fix for Harden PHP
- CVE-2022-31625: Fix freeing of uninitialized memory leading to RCE</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-18"/>
          <updated date="2022-07-18"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-763" href="https://cve.tuxcare.com/els/cve/CVE-2022-31625" impact="critical" public="20220616">CVE-2022-31625</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1658171149027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1643112395" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-44038</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1643112395" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1643112395" source="CLSA"/>
        <reference ref_id="CVE-2021-44038" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-44038" source="CVE"/>
        <description>- CVE-2021-44038: low privilege escalation during package installation/update due to 
  insecure chmod in spec file.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-01-25"/>
          <updated date="2022-01-25"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-59" href="https://cve.tuxcare.com/els/cve/CVE-2021-44038" impact="important" public="20211119">CVE-2021-44038</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="quagga is earlier than 0:0.99.15-14.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643112395001"/>
        <criteria operator="AND">
          <criterion comment="quagga isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643112395002"/>
          <criterion comment="quagga isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643112395003"/>
        </criteria>
        <criterion comment="quagga-contrib is earlier than 0:0.99.15-14.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643112395004"/>
        <criteria operator="AND">
          <criterion comment="quagga-contrib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643112395005"/>
          <criterion comment="quagga-contrib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643112395006"/>
        </criteria>
        <criterion comment="quagga-devel is earlier than 0:0.99.15-14.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643112395007"/>
        <criteria operator="AND">
          <criterion comment="quagga-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643112395008"/>
          <criterion comment="quagga-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643112395009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1640002354" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-43527</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1640002354" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1640002354" source="CLSA"/>
        <reference ref_id="CVE-2021-43527" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-43527" source="CVE"/>
        <description>- CVE-2021-43527: Fix memory corruption in decodeECorDsaSignature with DSA 
  signatures (and RSA-PSS)
- Update to CKBI 2.50 from NSS 3.67
-    Removing:
-     # Certificate "Verisign Class 3 Public Primary Certification Authority - G3"
-     # Certificate "AddTrust Low-Value Services Root"
-     # Certificate "AddTrust External Root"
-     # Certificate "GeoTrust Global CA"
-     # Certificate "GeoTrust Universal CA"
-     # Certificate "GeoTrust Universal CA 2"
-     # Certificate "QuoVadis Root CA"
-     # Certificate "Sonera Class 2 Root CA"
-     # Certificate "UTN USERFirst Email Root CA"
-     # Certificate "Taiwan GRCA"
-     # Certificate "Certplus Class 2 Primary CA"
-     # Certificate "GeoTrust Primary Certification Authority"
-     # Certificate "thawte Primary Root CA"
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G5"
-     # Certificate "Deutsche Telekom Root CA 2"
-     # Certificate "GeoTrust Primary Certification Authority - G3"
-     # Certificate "thawte Primary Root CA - G2"
-     # Certificate "thawte Primary Root CA - G3"
-     # Certificate "GeoTrust Primary Certification Authority - G2"
-     # Certificate "VeriSign Universal Root Certification Authority"
-     # Certificate "VeriSign Class 3 Public Primary Certification Authority - G4"
-     # Certificate "Staat der Nederlanden Root CA - G2"
-     # Certificate "Trustis FPS Root CA"
-     # Certificate "EE Certification Centre Root CA"
-     # Certificate "Swisscom Root CA 2"
-     # Certificate "Certinomis - Root CA"
-     # Certificate "LuxTrust Global Root 2"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority - G4"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority - G4"
-    Adding:
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "Microsoft ECC Root Certificate Authority 2017"
-     # Certificate "Microsoft RSA Root Certificate Authority 2017"
-     # Certificate "e-Szigno Root CA 2017"
-     # Certificate "certSIGN Root CA G2"
-     # Certificate "Trustwave Global Certification Authority"
-     # Certificate "Trustwave Global ECC P256 Certification Authority"
-     # Certificate "Trustwave Global ECC P384 Certification Authority"
-     # Certificate "NAVER Global Root Certification Authority"
-     # Certificate "AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
-     # Certificate "GlobalSign Secure Mail Root R45"
-     # Certificate "GlobalSign Secure Mail Root E45"
-     # Certificate "GlobalSign Root R46"
-     # Certificate "GlobalSign Root E46"
-     # Certificate "GLOBALTRUST 2020"
-     # Certificate "ANF Secure Server Root CA"
-     # Certificate "Certum EC-384 CA"
-     # Certificate "Certum Trusted Root CA"
- revert last change. Patch was for nss-softokn
- Fix out-of-bounds write in NSC_EncryptUpdate (#1775909)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-06"/>
          <updated date="2021-12-06"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-43527" impact="critical" public="20211208">CVE-2021-43527</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nss is earlier than 0:3.44.0-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1640002354001"/>
        <criteria operator="AND">
          <criterion comment="nss isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354002"/>
          <criterion comment="nss isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354003"/>
        </criteria>
        <criterion comment="nss-devel is earlier than 0:3.44.0-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1640002354004"/>
        <criteria operator="AND">
          <criterion comment="nss-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354005"/>
          <criterion comment="nss-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354006"/>
        </criteria>
        <criterion comment="nss-pkcs11-devel is earlier than 0:3.44.0-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1640002354007"/>
        <criteria operator="AND">
          <criterion comment="nss-pkcs11-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354008"/>
          <criterion comment="nss-pkcs11-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354009"/>
        </criteria>
        <criterion comment="nss-sysinit is earlier than 0:3.44.0-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1640002354010"/>
        <criteria operator="AND">
          <criterion comment="nss-sysinit isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354011"/>
          <criterion comment="nss-sysinit isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354012"/>
        </criteria>
        <criterion comment="nss-tools is earlier than 0:3.44.0-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1640002354013"/>
        <criteria operator="AND">
          <criterion comment="nss-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354014"/>
          <criterion comment="nss-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1641903536" version="1">
      <metadata>
        <title>Fix of 8 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1641903536" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1641903536" source="CLSA"/>
        <reference ref_id="CVE-2021-3516" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3516" source="CVE"/>
        <reference ref_id="CVE-2021-3517" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3517" source="CVE"/>
        <reference ref_id="CVE-2021-3537" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3537" source="CVE"/>
        <reference ref_id="CVE-2021-3541" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3541" source="CVE"/>
        <reference ref_id="CVE-2017-8872" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-8872" source="CVE"/>
        <reference ref_id="CVE-2020-24977" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24977" source="CVE"/>
        <reference ref_id="CVE-2019-20388" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-20388" source="CVE"/>
        <reference ref_id="CVE-2021-3518" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3518" source="CVE"/>
        <description>- CVE-2021-3517.patch: validate UTF8 in xmlEncodeEntities
- CVE-2021-3518.patch: fix user-after-free with 'xmllint --xinclude --dropdtd'
- CVE-2021-3537.patch: propagate error in xmlParseElementChildrenContentDeclPriv
- CVE-2021-3541.patch: parser fix for the billion laughs attack
- CVE-2021-3516.patch: fix use-after-free with 'xmllint --html --push'
- CVE-2017-8872.patch: free input buffer in xmlHaltParser
- CVE-2019-20388.patch: fix memory leak in xmlSchemaValidateStream
- CVE-2020-24977.patch: fix out-of-bounds read with 'xmllint --htmlout'</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-28"/>
          <updated date="2021-12-28"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-3516" impact="important" public="20210601">CVE-2021-3516</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-3517" impact="important" public="20210519">CVE-2021-3517</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2021-3537" impact="moderate" public="20210514">CVE-2021-3537</cve>
          <cve cvss2="4.0/AV:N/AC:L/Au:S/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-776" href="https://cve.tuxcare.com/els/cve/CVE-2021-3541" impact="moderate" public="20210709">CVE-2021-3541</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-8872" impact="critical" public="20170510">CVE-2017-8872</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-24977" impact="moderate" public="20200904">CVE-2020-24977</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://cve.tuxcare.com/els/cve/CVE-2019-20388" impact="important" public="20200121">CVE-2019-20388</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-3518" impact="important" public="20210518">CVE-2021-3518</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1641903536001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1641903536004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1641903536007"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1641903536010"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1647255880" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-23308</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1647255880" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1647255880" source="CLSA"/>
        <reference ref_id="CVE-2022-23308" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23308" source="CVE"/>
        <description>- CVE-2022-23308: fix use-after-free of ID and IDREF attributes</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-14"/>
          <updated date="2022-03-14"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-23308" impact="important" public="20220226">CVE-2022-23308</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1647255880001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1647255880002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1647255880003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1647255880004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1653004535" version="1">
      <metadata>
        <title>Fixed CVE-2018-25032 in rsync</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1653004535" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1653004535" source="CLSA"/>
        <reference ref_id="CVE-2018-25032" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-25032" source="CVE"/>
        <description>- CVE-2018-25032: Fix memory corruption when deflating if the input
  has many distant matches</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-05-19"/>
          <updated date="2022-05-19"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2018-25032" impact="important" public="20220325">CVE-2018-25032</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1653004535001"/>
        <criteria operator="AND">
          <criterion comment="rsync isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653004535002"/>
          <criterion comment="rsync isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653004535003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1654717777" version="1">
      <metadata>
        <title>Fixed CVE-2022-24903 in rsyslog</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1654717777" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1654717777" source="CLSA"/>
        <reference ref_id="CVE-2022-24903" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-24903" source="CVE"/>
        <description>- CVE-2022-24903: fix heap-based overflow in TCP syslog server</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-08"/>
          <updated date="2022-06-08"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2022-24903" impact="important" public="20220506">CVE-2022-24903</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsyslog is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777001"/>
        <criteria operator="AND">
          <criterion comment="rsyslog isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777002"/>
          <criterion comment="rsyslog isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777003"/>
        </criteria>
        <criterion comment="rsyslog-gnutls is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777004"/>
        <criteria operator="AND">
          <criterion comment="rsyslog-gnutls isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777005"/>
          <criterion comment="rsyslog-gnutls isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777006"/>
        </criteria>
        <criterion comment="rsyslog-gssapi is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777007"/>
        <criteria operator="AND">
          <criterion comment="rsyslog-gssapi isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777008"/>
          <criterion comment="rsyslog-gssapi isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777009"/>
        </criteria>
        <criterion comment="rsyslog-mysql is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777010"/>
        <criteria operator="AND">
          <criterion comment="rsyslog-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777011"/>
          <criterion comment="rsyslog-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777012"/>
        </criteria>
        <criterion comment="rsyslog-pgsql is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777013"/>
        <criteria operator="AND">
          <criterion comment="rsyslog-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777014"/>
          <criterion comment="rsyslog-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777015"/>
        </criteria>
        <criterion comment="rsyslog-relp is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777016"/>
        <criteria operator="AND">
          <criterion comment="rsyslog-relp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777017"/>
          <criterion comment="rsyslog-relp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777018"/>
        </criteria>
        <criterion comment="rsyslog-snmp is earlier than 0:5.8.10-12.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654717777019"/>
        <criteria operator="AND">
          <criterion comment="rsyslog-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1654717777020"/>
          <criterion comment="rsyslog-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1654717777021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1649170979" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0943</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1649170979" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1649170979" source="CLSA"/>
        <reference ref_id="CVE-2022-0943" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0943" source="CVE"/>
        <description>- CVE-2022-0943: fix heap-based buffer overflow</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-05"/>
          <updated date="2022-04-05"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-0943" impact="important" public="20220314">CVE-2022-0943</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1649170979001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1649170979004"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1649170979007"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1649170979010"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1649170979013"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1649869347" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-1154</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1649869347" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1649869347" source="CLSA"/>
        <reference ref_id="CVE-2022-1154" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1154" source="CVE"/>
        <description>- CVE-2022-1154: fix buffer usage after free</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-13"/>
          <updated date="2022-04-13"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1154" impact="critical" public="20220330">CVE-2022-1154</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1649869347001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1649869347002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1649869347003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1649869347004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1649869347005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1653006752" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-1620, CVE-2022-1616, CVE-2022-1629, CVE-2022-1621, CVE-2022-1619</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1653006752" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1653006752" source="CLSA"/>
        <reference ref_id="CVE-2022-1621" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1621" source="CVE"/>
        <reference ref_id="CVE-2022-1619" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1619" source="CVE"/>
        <reference ref_id="CVE-2022-1620" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1620" source="CVE"/>
        <reference ref_id="CVE-2022-1629" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1629" source="CVE"/>
        <reference ref_id="CVE-2022-1616" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1616" source="CVE"/>
        <description>- CVE-2022-1619: fix going before the command line start with latin1 encoding
- CVE-2022-1620: fix NULL pointer dereference when using invalig regexp
- CVE-2022-1621: fix to avoid adding invalid bytes with :spellgood
- CVE-2022-1629: fix reading past end of line if ended with trailing backslash
- CVE-2022-1616: fix buffer overflow with invalid command with composing chars</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-05-20"/>
          <updated date="2022-05-20"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1621" impact="important" public="20220510">CVE-2022-1621</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1619" impact="important" public="20220508">CVE-2022-1619</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2022-1620" impact="important" public="20220508">CVE-2022-1620</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-1629" impact="important" public="20220510">CVE-2022-1629</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1616" impact="important" public="20220507">CVE-2022-1616</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1653006752001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1653006752002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1653006752003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1653006752004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1653006752005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1653933185" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-1733, CVE-2022-1735</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1653933185" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1653933185" source="CLSA"/>
        <reference ref_id="CVE-2022-1735" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1735" source="CVE"/>
        <reference ref_id="CVE-2022-1733" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1733" source="CVE"/>
        <description>- CVE-2022-1733: fix reading past end of the line when C-indenting
- CVE-2022-1735: fix invalid memory access caused by changing text in Visual mode</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-05-30"/>
          <updated date="2022-05-30"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2022-1735" impact="important" public="20220517">CVE-2022-1735</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1733" impact="important" public="20220517">CVE-2022-1733</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1653933185001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1653933185002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1653933185003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1653933185004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1653933185005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1654529495" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-1796, CVE-2022-1785</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1654529495" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1654529495" source="CLSA"/>
        <reference ref_id="CVE-2022-1785" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1785" source="CVE"/>
        <reference ref_id="CVE-2022-1796" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1796" source="CVE"/>
        <description>- CVE-2022-1785: fix out-of-bounds write by disallowing changing window
  in substitute expression
- CVE-2022-1796: fix use after free by making a copy of a line</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-06"/>
          <updated date="2022-06-06"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1785" impact="important" public="20220519">CVE-2022-1785</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1796" impact="important" public="20220519">CVE-2022-1796</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1654529495001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1654529495002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1654529495003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1654529495004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1654529495005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1654804579" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-1886, CVE-2022-0319, CVE-2022-1898, CVE-2022-1851</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1654804579" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1654804579" source="CLSA"/>
        <reference ref_id="CVE-2022-1898" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1898" source="CVE"/>
        <reference ref_id="CVE-2022-1851" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1851" source="CVE"/>
        <reference ref_id="CVE-2022-0319" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0319" source="CVE"/>
        <reference ref_id="CVE-2022-1886" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1886" source="CVE"/>
        <description>- CVE-2022-0319: correct end of Visual area when entering another buffer
- CVE-2022-1851: fix invalid cursor position after text formatting
- CVE-2022-1886: fix access before start of text with a put command
- CVE-2022-1898: fix using freed memory with ']d'</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-09"/>
          <updated date="2022-06-09"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1898" impact="important" public="20220527">CVE-2022-1898</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-1851" impact="important" public="20220525">CVE-2022-1851</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-0319" impact="moderate" public="20220121">CVE-2022-0319</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1886" impact="important" public="20220526">CVE-2022-1886</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1654804579001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1654804579002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1654804579003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1654804579004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1654804579005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1655320860" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-1897, CVE-2022-1927</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1655320860" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1655320860" source="CLSA"/>
        <reference ref_id="CVE-2022-1927" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1927" source="CVE"/>
        <reference ref_id="CVE-2022-1897" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1897" source="CVE"/>
        <description>- CVE-2022-1897: fix substitution which overwrites an allocated buffer
- CVE-2022-1927: fix invalid cursor position after '0;' range</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-15"/>
          <updated date="2022-06-15"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-1927" impact="critical" public="20220529">CVE-2022-1927</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1897" impact="important" public="20220527">CVE-2022-1897</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1655320860001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1655320860002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1655320860003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1655320860004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1655320860005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1655901698" version="1">
      <metadata>
        <title>Fixed CVE-2022-2042 in vim</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1655901698" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1655901698" source="CLSA"/>
        <reference ref_id="CVE-2022-1942" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1942" source="CVE"/>
        <reference ref_id="CVE-2022-1968" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1968" source="CVE"/>
        <reference ref_id="CVE-2022-2000" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2000" source="CVE"/>
        <reference ref_id="CVE-2022-2042" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2042" source="CVE"/>
        <description>- CVE-2022-2042: fix using uninitialized value and freed memory in spell command</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-22"/>
          <updated date="2022-06-22"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-1942" impact="important" public="20220531">CVE-2022-1942</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1968" impact="important" public="20220602">CVE-2022-1968</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-2000" impact="important" public="20220609">CVE-2022-2000</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-2042" impact="critical" public="20220610">CVE-2022-2042</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1655901698001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1655901698002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1655901698003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1655901698004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1655901698005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1657182572" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-1720, CVE-2022-2129</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1657182572" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1657182572" source="CLSA"/>
        <reference ref_id="CVE-2022-2125" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2125" source="CVE"/>
        <reference ref_id="CVE-2022-2126" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2126" source="CVE"/>
        <reference ref_id="CVE-2022-1720" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1720" source="CVE"/>
        <reference ref_id="CVE-2022-2129" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2129" source="CVE"/>
        <reference ref_id="CVE-2022-2124" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2124" source="CVE"/>
        <description>- CVE-2022-2125: add checking for NUL to avoid running over the end of line
- CVE-2022-1720: do not include the NUL in the length to avoid reading past end
  of line with "gf" in Visual block mode
- CVE-2022-2124: add checking for NUL to avoid running over the end of line
- CVE-2022-2129: disallow switching buffers in a substitute expression to avoid
  overruning destination buffer
- CVE-2022-2126: do not decrement the index when it is zero</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-07"/>
          <updated date="2022-07-07"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2125" impact="important" public="20220619">CVE-2022-2125</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2126" impact="important" public="20220619">CVE-2022-2126</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-126" href="https://cve.tuxcare.com/els/cve/CVE-2022-1720" impact="important" public="20220620">CVE-2022-1720</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-2129" impact="important" public="20220619">CVE-2022-2129</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-126" href="https://cve.tuxcare.com/els/cve/CVE-2022-2124" impact="important" public="20220619">CVE-2022-2124</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1657182572001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1657182572002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1657182572003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1657182572004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1657182572005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1657817751" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-2182, CVE-2022-2210, CVE-2022-2207, CVE-2022-2183</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1657817751" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1657817751" source="CLSA"/>
        <reference ref_id="CVE-2022-2182" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2182" source="CVE"/>
        <reference ref_id="CVE-2022-2175" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2175" source="CVE"/>
        <reference ref_id="CVE-2022-2207" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2207" source="CVE"/>
        <reference ref_id="CVE-2022-2210" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2210" source="CVE"/>
        <reference ref_id="CVE-2022-2183" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2183" source="CVE"/>
        <description>- CVE-2022-2182: when on line zero check the column is valid for line one
- CVE-2022-2183: avoid going over the NUL at the end of the line
- CVE-2022-2207: check the cursor column is more than zero
- CVE-2022-2210: use zero offset when change removes all lines in a diff block.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-14"/>
          <updated date="2022-07-14"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2182" impact="important" public="20220623">CVE-2022-2182</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-126" href="https://cve.tuxcare.com/els/cve/CVE-2022-2175" impact="important" public="20220623">CVE-2022-2175</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2207" impact="critical" public="20220627">CVE-2022-2207</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-2210" impact="critical" public="20220627">CVE-2022-2210</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2183" impact="important" public="20220623">CVE-2022-2183</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1657817751001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1657817751002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1657817751003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1657817751004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1657817751005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1658171278" version="1">
      <metadata>
        <title>Fixed 7 CVEs in vim</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1658171278" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1658171278" source="CLSA"/>
        <reference ref_id="CVE-2022-2264" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2264" source="CVE"/>
        <reference ref_id="CVE-2022-2206" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2206" source="CVE"/>
        <reference ref_id="CVE-2022-2285" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2285" source="CVE"/>
        <reference ref_id="CVE-2022-2286" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2286" source="CVE"/>
        <reference ref_id="CVE-2022-2257" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2257" source="CVE"/>
        <reference ref_id="CVE-2022-2284" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2284" source="CVE"/>
        <reference ref_id="CVE-2022-2287" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2287" source="CVE"/>
        <description>- CVE-2022-2206: adjust cmdline_row and msg_row to the value of Rows
- CVE-2022-2284: stop visual mode when closing a window
- CVE-2022-2285: put a NUL after the typeahead
- CVE-2022-2286: check the length of the string
- CVE-2022-2287: disallow adding a word with control characters or a trailing slash
- CVE-2022-2264: adjust the end mark position
- CVE-2022-2257: check for NUL on string special values parsing</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-18"/>
          <updated date="2022-07-18"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2264" impact="important" public="20220701">CVE-2022-2264</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2206" impact="important" public="20220626">CVE-2022-2206</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-2285" impact="important" public="20220702">CVE-2022-2285</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2286" impact="important" public="20220702">CVE-2022-2286</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2257" impact="important" public="20220630">CVE-2022-2257</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2284" impact="important" public="20220702">CVE-2022-2284</cve>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:P/I:N/A:P" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2287" impact="important" public="20220702">CVE-2022-2287</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1658171278001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1658171278002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1658171278003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1658171278004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1658171278005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1638803795" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3928, CVE-2021-3927</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1638803795" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1638803795" source="CLSA"/>
        <reference ref_id="CVE-2021-3927" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3927" source="CVE"/>
        <reference ref_id="CVE-2021-3928" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3928" source="CVE"/>
        <description>- CVE-2021-3927: fix heap-based buffer overflow when reading character past end of line
- CVE-2021-3928: fix stack-based buffer overflow when reading uninitialized memory when giving spell suggestions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-06"/>
          <updated date="2021-12-06"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3927" impact="important" public="20211105">CVE-2021-3927</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-457" href="https://cve.tuxcare.com/els/cve/CVE-2021-3928" impact="important" public="20211105">CVE-2021-3928</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1638803795001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1638803795002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1638803795003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1638803795004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1638803795005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1640621325" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3973, CVE-2021-3974, CVE-2021-4019, CVE-2021-4069, CVE-2021-3984</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1640621325" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1640621325" source="CLSA"/>
        <reference ref_id="CVE-2021-3974" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3974" source="CVE"/>
        <reference ref_id="CVE-2021-4019" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4019" source="CVE"/>
        <reference ref_id="CVE-2021-3984" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3984" source="CVE"/>
        <reference ref_id="CVE-2021-4069" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4069" source="CVE"/>
        <reference ref_id="CVE-2021-3973" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3973" source="CVE"/>
        <description>- CVE-2021-3974: fix using freed memory with regexp using a mark
- CVE-2021-3984: fix illegal memory access when C-indenting
- CVE-2021-3973: fix crash when using CTRL-W f without finding a file name
- CVE-2021-4019: fix buffer overflow with long help argument
- CVE-2021-4069: fix using freed memory in open command</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-15"/>
          <updated date="2021-12-15"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-3974" impact="important" public="20211119">CVE-2021-3974</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-4019" impact="important" public="20211201">CVE-2021-4019</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3984" impact="important" public="20211201">CVE-2021-3984</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-4069" impact="important" public="20211206">CVE-2021-4069</cve>
          <cve cvss2="9.3/AV:N/AC:M/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3973" impact="important" public="20211119">CVE-2021-3973</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1640621325001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1640621325002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1640621325003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1640621325004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1640621325005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1642087497" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-4192, CVE-2021-4193</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1642087497" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1642087497" source="CLSA"/>
        <reference ref_id="CVE-2021-4192" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4192" source="CVE"/>
        <reference ref_id="CVE-2021-4193" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4193" source="CVE"/>
        <description>- CVE-2021-4192: fix using freed memory in /\%V
- CVE-2021-4193: fix going beyond the end of the line with /\%V</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-01-13"/>
          <updated date="2022-01-13"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-4192" impact="important" public="20211231">CVE-2021-4192</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-4193" impact="moderate" public="20211231">CVE-2021-4193</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1642087497001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1642087497002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1642087497003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1642087497004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1642087497005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1643640508" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0261, CVE-2022-0213</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1643640508" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1643640508" source="CLSA"/>
        <reference ref_id="CVE-2022-0213" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0213" source="CVE"/>
        <reference ref_id="CVE-2022-0261" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0261" source="CVE"/>
        <description>- CVE-2022-0213: fix going over the end of status line buffer
- CVE-2022-0261: fix block insert goes over the end of the line</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-01-31"/>
          <updated date="2022-01-31"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-0213" impact="moderate" public="20220114">CVE-2022-0213</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-0261" impact="important" public="20220118">CVE-2022-0261</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643640508001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643640508002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643640508003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643640508004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1643640508005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1644855718" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0351, CVE-2022-0368, CVE-2022-0359, CVE-2022-0361</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1644855718" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1644855718" source="CLSA"/>
        <reference ref_id="CVE-2022-0359" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0359" source="CVE"/>
        <reference ref_id="CVE-2022-0351" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0351" source="CVE"/>
        <reference ref_id="CVE-2022-0361" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0361" source="CVE"/>
        <reference ref_id="CVE-2022-0368" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0368" source="CVE"/>
        <description>- CVE-2022-0351: fix crash caused by too depth recursion
- CVE-2022-0359: fix illegal memory access with large tabstop in ex mode
- CVE-2022-0361: fix illegal memory access when copying lines in visual mode
- CVE-2022-0368: fix illegal memory access when undo makes visual area invalid</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-02-14"/>
          <updated date="2022-02-14"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-0359" impact="important" public="20220126">CVE-2022-0359</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2022-0351" impact="important" public="20220125">CVE-2022-0351</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-0361" impact="important" public="20220126">CVE-2022-0361</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-0368" impact="important" public="20220126">CVE-2022-0368</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1644855718001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1644855718002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1644855718003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1644855718004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1644855718005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1645466182" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0413, CVE-2022-0417, CVE-2022-0408, CVE-2022-0443</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1645466182" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1645466182" source="CLSA"/>
        <reference ref_id="CVE-2022-0417" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0417" source="CVE"/>
        <reference ref_id="CVE-2022-0443" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0443" source="CVE"/>
        <reference ref_id="CVE-2022-0408" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0408" source="CVE"/>
        <reference ref_id="CVE-2022-0413" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0413" source="CVE"/>
        <description>- CVE-2022-0408: fix stack corruption when looking for spell suggestions
- CVE-2022-0413: fix using freed memory when substitute with function call
- CVE-2022-0417: fix illegal memory access caused by ':retab 0'
- CVE-2022-0443: fix using freed memory with ':lopen' and ':bwipe'</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-02-21"/>
          <updated date="2022-02-21"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-0417" impact="important" public="20220201">CVE-2022-0417</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-0443" impact="important" public="20220202">CVE-2022-0443</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://cve.tuxcare.com/els/cve/CVE-2022-0408" impact="important" public="20220130">CVE-2022-0408</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-0413" impact="important" public="20220130">CVE-2022-0413</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1645466182001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1645466182002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1645466182003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1645466182004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1645466182005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1646915237" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0554, CVE-2022-0729, CVE-2022-0685, CVE-2022-0572</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1646915237" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1646915237" source="CLSA"/>
        <reference ref_id="CVE-2022-0685" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0685" source="CVE"/>
        <reference ref_id="CVE-2022-0729" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0729" source="CVE"/>
        <reference ref_id="CVE-2022-0554" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0554" source="CVE"/>
        <reference ref_id="CVE-2022-0572" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0572" source="CVE"/>
        <description>- CVE-2022-0554: fix ending up with no current buffer
- CVE-2022-0572: fix crashing when repeatedly using :retab
- CVE-2022-0685: fix crashing when using special multi-byte character
- CVE-2022-0729: fix crashing with specific regexp pattern and string</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-03-10"/>
          <updated date="2022-03-10"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-0685" impact="important" public="20220220">CVE-2022-0685</cve>
          <cve cvss2="6.5/AV:N/AC:L/Au:S/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2022-0729" impact="important" public="20220223">CVE-2022-0729</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2022-0554" impact="important" public="20220210">CVE-2022-0554</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-0572" impact="important" public="20220214">CVE-2022-0572</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1646915237001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1646915237002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1646915237003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1646915237004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1646915237005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1634745118" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3778, CVE-2021-3796</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1634745118" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1634745118" source="CLSA"/>
        <reference ref_id="CVE-2021-3778" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3778" source="CVE"/>
        <reference ref_id="CVE-2021-3796" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3796" source="CVE"/>
        <description>- CVE-2021-3778: crafted input leads to heap-based buffer overflow
- CVE-2021-3796: crafted input leads to use-after-free</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-20"/>
          <updated date="2021-10-20"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3778" impact="important" public="20210915">CVE-2021-3778</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-3796" impact="important" public="20210915">CVE-2021-3796</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 2:7.4.629-6.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745118001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 2:7.4.629-6.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745118002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 2:7.4.629-6.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745118003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 2:7.4.629-6.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745118004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 2:7.4.629-6.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1634745118005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1637673150" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3903, CVE-2021-3875, CVE-2021-3872</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1637673150" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1637673150" source="CLSA"/>
        <reference ref_id="CVE-2021-3875" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3875" source="CVE"/>
        <reference ref_id="CVE-2021-3903" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3903" source="CVE"/>
        <reference ref_id="CVE-2021-3872" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3872" source="CVE"/>
        <description>- CVE-2021-3872: fix illegal memory access if buffer name is very long
- CVE-2021-3875: fix ml_get error after search with range
- CVE-2021-3903: fix invalid memory access when scrolling without a valid screen</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-11-23"/>
          <updated date="2021-11-23"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3875" impact="moderate" public="20211015">CVE-2021-3875</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3903" impact="important" public="20211027">CVE-2021-3903</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2021-3872" impact="important" public="20211019">CVE-2021-3872</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 2:7.4.629-7.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673150001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 2:7.4.629-7.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673150002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 2:7.4.629-7.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673150003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 2:7.4.629-7.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673150004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 2:7.4.629-7.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1637673150005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1652706231" version="1">
      <metadata>
        <title>Fixed CVE-2018-25032 in zlib</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1652706231" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1652706231" source="CLSA"/>
        <reference ref_id="CVE-2018-25032" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-25032" source="CVE"/>
        <description>- CVE-2018-25032: Fix memory corruption when deflating
  if the input has many distant matches</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-05-16"/>
          <updated date="2022-05-16"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2018-25032" impact="important" public="20220325">CVE-2018-25032</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1652706231001"/>
        <criteria operator="AND">
          <criterion comment="minizip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231002"/>
          <criterion comment="minizip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231003"/>
        </criteria>
        <criterion comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1652706231004"/>
        <criteria operator="AND">
          <criterion comment="minizip-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231005"/>
          <criterion comment="minizip-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231006"/>
        </criteria>
        <criterion comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1652706231007"/>
        <criteria operator="AND">
          <criterion comment="zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231008"/>
          <criterion comment="zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231009"/>
        </criteria>
        <criterion comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1652706231010"/>
        <criteria operator="AND">
          <criterion comment="zlib-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231011"/>
          <criterion comment="zlib-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231012"/>
        </criteria>
        <criterion comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1652706231013"/>
        <criteria operator="AND">
          <criterion comment="zlib-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231014"/>
          <criterion comment="zlib-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632262184" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-2388</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632262184" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632262184" source="CLSA"/>
        <reference ref_id="CVE-2021-2388" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-2388" source="CVE"/>
        <description>- Fix CVE-2021-2388 OpenJDK: Incorrect comparison during range check elimination</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2021-2388" impact="important" public="20210721">CVE-2021-2388</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184013"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184016"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184019"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184022"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184025"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184028"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184031"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262184034"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1654174749" version="1">
      <metadata>
        <title>Fixed CVEs in java-1.8.0-openjdk: CVE-2022-21496, CVE-2022-21476, CVE-2022-21434, CVE-2022-21443, CVE-2022-21426</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1654174749" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1654174749" source="CLSA"/>
        <reference ref_id="CVE-2022-21476" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21476" source="CVE"/>
        <reference ref_id="CVE-2022-21443" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21443" source="CVE"/>
        <reference ref_id="CVE-2022-21496" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21496" source="CVE"/>
        <reference ref_id="CVE-2022-21426" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21426" source="CVE"/>
        <reference ref_id="CVE-2022-21434" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21434" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u332-b09. That fixes following CVEs:
- CVE-2022-21476: Defective secure validation in Apache Santuario
- CVE-2022-21496: URI parsing inconsistencies
- CVE-2022-21434: Improper object-to-string conversion in AnnotationInvocationHandler
- CVE-2022-21426: Unbounded memory allocation when compiling crafted XPath expressions
- CVE-2022-21443: Missing check for negative ObjectIdentifier
- Remove patch files from previous change due to their presence in newer versions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-06-02"/>
          <updated date="2022-06-02"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21476" impact="important" public="20220419">CVE-2022-21476</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21443" impact="low" public="20220419">CVE-2022-21443</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21496" impact="moderate" public="20220419">CVE-2022-21496</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21426" impact="moderate" public="20220419">CVE-2022-21426</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21434" impact="moderate" public="20220419">CVE-2022-21434</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1654174749012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632262221" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-8517, CVE-2021-28651, CVE-2020-15049, CVE-2020-8449, CVE-2020-8450, CVE-2020-24606, CVE-2020-25097, CVE-2020-11945, CVE-2020-14058</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632262221" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632262221" source="CLSA"/>
        <reference ref_id="CVE-2020-8449" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8449" source="CVE"/>
        <reference ref_id="CVE-2020-11945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-11945" source="CVE"/>
        <reference ref_id="CVE-2020-8450" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8450" source="CVE"/>
        <reference ref_id="CVE-2020-14058" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14058" source="CVE"/>
        <reference ref_id="CVE-2020-8517" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8517" source="CVE"/>
        <reference ref_id="CVE-2020-24606" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24606" source="CVE"/>
        <reference ref_id="CVE-2020-15049" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-15049" source="CVE"/>
        <reference ref_id="CVE-2021-28651" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-28651" source="CVE"/>
        <reference ref_id="CVE-2020-25097" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25097" source="CVE"/>
        <description>- CVE-2020-15049: fix incorrect validation of Content-Length field leading to
  Http smuggling and Poisoning attack
- CVE-2020-14058: fix handling of unknown SSL errors which resulted in denial of
  service
- CVE-2020-25097: fix improper input validation allowing HTTP smuggling from
  trusted client
- CVE-2020-11945: fix nonce reference counter overflow allowing replay attack
- CVE-2020-24606: fix handle of EOF in peerDigestHandleReply() leading to Denial
  of service
- CVE-2020-8517: fix incorrect input validation allowing writing outside of buffer
  and leading to denial of service
- CVE-2020-8449: fix improper HTTP request validation allowing access to 
  resources which are prohibited by security filters
- CVE-2020-8450: fix incorrect buffer managment leading to buffer overflow
- CVE-2021-28651: fix memory leak leading to denial of service</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-668" href="https://cve.tuxcare.com/els/cve/CVE-2020-8449" impact="important" public="20200204">CVE-2020-8449</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-11945" impact="critical" public="20200423">CVE-2020-11945</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2020-8450" impact="important" public="20200204">CVE-2020-8450</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2020-14058" impact="important" public="20200630">CVE-2020-14058</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-8517" impact="important" public="20200204">CVE-2020-8517</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-667" href="https://cve.tuxcare.com/els/cve/CVE-2020-24606" impact="important" public="20200824">CVE-2020-24606</cve>
          <cve cvss2="6.5/AV:N/AC:L/Au:S/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els/cve/CVE-2020-15049" impact="important" public="20200630">CVE-2020-15049</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://cve.tuxcare.com/els/cve/CVE-2021-28651" impact="important" public="20210527">CVE-2021-28651</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-25097" impact="important" public="20210319">CVE-2020-25097</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262221001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1632262337" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-24513, CVE-2020-24489, CVE-2020-24512, CVE-2020-24511</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1632262337" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1632262337" source="CLSA"/>
        <reference ref_id="CVE-2020-24489" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24489" source="CVE"/>
        <reference ref_id="CVE-2020-24513" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24513" source="CVE"/>
        <reference ref_id="CVE-2020-24511" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24511" source="CVE"/>
        <reference ref_id="CVE-2020-24512" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24512" source="CVE"/>
        <description>- Do not use "grep -q" in a pipe in check_caveats.
- Update Intel CPU microcode to microcode-20210608 release:
  - Fixes in releasenote.md file.
- Update Intel CPU microcode to microcode-20210525 release, addresses
  CVE-2020-24489, CVE-2020-24511, CVE-2020-24512, and CVE-2020-24513
  (#1962659, #1962709, #1962729, #1962675):
  - Addition of 06-55-05/0xb7 (CLX-SP A0) microcode at revision 0x3000010;
  - Addition of 06-6a-05/0x87 (ICX-SP C0) microcode at revision 0xc0002f0;
  - Addition of 06-6a-06/0x87 (ICX-SP D0) microcode at revision 0xd0002a0;
  - Addition of 06-86-04/0x01 (SNR B0) microcode at revision 0xb00000f;
  - Addition of 06-86-05/0x01 (SNR B1) microcode (in intel-ucode/06-86-04)
    at revision 0xb00000f;
  - Addition of 06-86-04/0x01 (SNR B0) microcode (in intel-ucode/06-86-05)
    at revision 0xb00000f;
  - Addition of 06-86-05/0x01 (SNR B1) microcode at revision 0xb00000f;
  - Addition of 06-8c-02/0xc2 (TGL-R C0) microcode at revision 0x16;
  - Addition of 06-8d-01/0xc2 (TGL-H R0) microcode at revision 0x2c;
  - Addition of 06-96-01/0x01 (EHL B1) microcode at revision 0x11;
  - Addition of 06-9c-00/0x01 (JSL A0/A1) microcode at revision 0x1d;
  - Addition of 06-a7-01/0x02 (RKL-S B0) microcode at revision 0x40;
  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in
    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xe2 up to 0xea;
  - Update of 06-4f-01/0xef (BDX-E/EP/EX/ML B0/M0/R0) microcode (in
    intel-06-4f-01/intel-ucode/06-4f-01) from revision 0xb000038 up
    to 0xb00003e;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a0a up
    to 0x2006b06;
  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in
    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xe2 up to 0xea;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0x68 up to 0x88;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xde up
    to 0xea;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xde up
    to 0xea;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xe0 up
    to 0xea;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xde up
    to 0xea;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
    revision 0xde up to 0xea;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xde up
    to 0xea;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xde up
    to 0xea;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xde up
    to 0xea;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xde up
    to 0xea;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xde up
    to 0xea;
  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode
    from revision 0x44 up to 0x46;
  - Update of 06-3f-04/0x80 (HSX-EX E0) microcode from revision 0x16 up
    to 0x19;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000159
    up to 0x100015b;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003006
    up to 0x4003102;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
    0x5003006 up to 0x5003102;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x700001e
    up to 0x7002302;
  - Update of 06-56-03/0x10 (BDX-DE V2/V3) microcode from revision
    0x7000019 up to 0x700001b;
  - Update of 06-56-04/0x10 (BDX-DE Y0) microcode from revision 0xf000017
    up to 0xf000019;
  - Update of 06-56-05/0x10 (BDX-NS A0/A1, HWL A1) microcode from revision
    0xe00000f up to 0xe000012;
  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x40 up
    to 0x44;
  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x1e up
    to 0x20;
  - Update of 06-5f-01/0x01 (DNV B0) microcode from revision 0x2e up
    to 0x34;
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x34 up
    to 0x36;
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x18 up
    to 0x1a;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xa0
    up to 0xa6;
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x28 up
    to 0x2a;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xe0 up
    to 0xea;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xe0
    up to 0xea;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xe0
    up to 0xec;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xe0
    up to 0xe8;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode from revision
    0xe0 up to 0xea.
- Update Intel CPU microcode to microcode-20210216 release (#1905111):
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006a08 up
    to 0x2006a0a;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003003
    up to 0x4003006;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
    0x5003003 up to 0x5003006.
- Update Intel CPU microcode to microcode-20201112 release:
  - Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up
    to 0x34;
  - Updated releasenote file.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-09-21"/>
          <updated date="2021-09-21"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-459" href="https://cve.tuxcare.com/els/cve/CVE-2020-24489" impact="important" public="20210609">CVE-2020-24489</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-24513" impact="moderate" public="20210609">CVE-2020-24513</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-668" href="https://cve.tuxcare.com/els/cve/CVE-2020-24511" impact="moderate" public="20210609">CVE-2020-24511</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-203" href="https://cve.tuxcare.com/els/cve/CVE-2020-24512" impact="low" public="20210609">CVE-2020-24512</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="microcode_ctl is earlier than 2:1.17-33.34.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1632262337001"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262337002"/>
          <criterion comment="microcode_ctl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262337003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650376845" version="1">
      <metadata>
        <title>Update of microcode_ctl</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650376845" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650376845" source="CLSA"/>
        <reference ref_id="CVE-2021-0145" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-0145" source="CVE"/>
        <reference ref_id="CVE-2021-0127" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-0127" source="CVE"/>
        <reference ref_id="CVE-2021-33120" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-33120" source="CVE"/>
        <description>- Update Intel CPU microcode to microcode-20220207 release:
  - Fixes in releasenote.md file.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-19"/>
          <updated date="2022-04-19"/>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-665" href="https://cve.tuxcare.com/els/cve/CVE-2021-0145" impact="moderate" public="20220209">CVE-2021-0145</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2021-0127" impact="moderate" public="20220209">CVE-2021-0127</cve>
          <cve cvss2="5.5/AV:N/AC:L/Au:S/C:P/I:N/A:P" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-33120" impact="moderate" public="20220209">CVE-2021-33120</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="microcode_ctl is earlier than 2:1.17-33.37.el6_10.tuxcare.els" test_ref="oval:com.tuxcare.clsa:tst:1650376845001"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262337002"/>
          <criterion comment="microcode_ctl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262337003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650575983" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-27135</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650575983" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650575983" source="CLSA"/>
        <reference ref_id="CVE-2021-27135" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-27135" source="CVE"/>
        <description>- CVE-2021-27135: fix crash when processing combining characters</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-21"/>
          <updated date="2022-04-21"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2021-27135" impact="critical" public="20210210">CVE-2021-27135</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="xterm is earlier than 0:253-2.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1650575983001"/>
        <criteria operator="AND">
          <criterion comment="xterm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575983002"/>
          <criterion comment="xterm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575983003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1638803819" version="1">
      <metadata>
        <title>Fix of 56 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1638803819" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1638803819" source="CLSA"/>
        <reference ref_id="CVE-2017-14130" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-14130" source="CVE"/>
        <reference ref_id="CVE-2017-15225" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-15225" source="CVE"/>
        <reference ref_id="CVE-2017-14940" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-14940" source="CVE"/>
        <reference ref_id="CVE-2017-16826" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-16826" source="CVE"/>
        <reference ref_id="CVE-2017-8398" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-8398" source="CVE"/>
        <reference ref_id="CVE-2017-12449" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12449" source="CVE"/>
        <reference ref_id="CVE-2017-9747" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9747" source="CVE"/>
        <reference ref_id="CVE-2017-12458" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12458" source="CVE"/>
        <reference ref_id="CVE-2017-12453" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12453" source="CVE"/>
        <reference ref_id="CVE-2017-14932" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-14932" source="CVE"/>
        <reference ref_id="CVE-2017-15938" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-15938" source="CVE"/>
        <reference ref_id="CVE-2017-17123" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-17123" source="CVE"/>
        <reference ref_id="CVE-2017-12456" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12456" source="CVE"/>
        <reference ref_id="CVE-2017-7225" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7225" source="CVE"/>
        <reference ref_id="CVE-2017-8394" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-8394" source="CVE"/>
        <reference ref_id="CVE-2017-8421" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-8421" source="CVE"/>
        <reference ref_id="CVE-2017-9749" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9749" source="CVE"/>
        <reference ref_id="CVE-2017-15020" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-15020" source="CVE"/>
        <reference ref_id="CVE-2017-15939" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-15939" source="CVE"/>
        <reference ref_id="CVE-2017-15996" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-15996" source="CVE"/>
        <reference ref_id="CVE-2017-17124" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-17124" source="CVE"/>
        <reference ref_id="CVE-2017-12454" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12454" source="CVE"/>
        <reference ref_id="CVE-2017-12452" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12452" source="CVE"/>
        <reference ref_id="CVE-2017-8396" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-8396" source="CVE"/>
        <reference ref_id="CVE-2017-7226" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7226" source="CVE"/>
        <reference ref_id="CVE-2017-12457" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12457" source="CVE"/>
        <reference ref_id="CVE-2017-9744" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9744" source="CVE"/>
        <reference ref_id="CVE-2017-9742" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9742" source="CVE"/>
        <reference ref_id="CVE-2017-9754" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9754" source="CVE"/>
        <reference ref_id="CVE-2017-14333" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-14333" source="CVE"/>
        <reference ref_id="CVE-2017-14938" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-14938" source="CVE"/>
        <reference ref_id="CVE-2017-12451" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12451" source="CVE"/>
        <reference ref_id="CVE-2017-16828" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-16828" source="CVE"/>
        <reference ref_id="CVE-2017-17080" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-17080" source="CVE"/>
        <reference ref_id="CVE-2017-7302" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7302" source="CVE"/>
        <reference ref_id="CVE-2017-7300" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7300" source="CVE"/>
        <reference ref_id="CVE-2017-7299" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7299" source="CVE"/>
        <reference ref_id="CVE-2017-17125" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-17125" source="CVE"/>
        <reference ref_id="CVE-2017-12459" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12459" source="CVE"/>
        <reference ref_id="CVE-2017-12448" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12448" source="CVE"/>
        <reference ref_id="CVE-2017-13710" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-13710" source="CVE"/>
        <reference ref_id="CVE-2017-7223" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7223" source="CVE"/>
        <reference ref_id="CVE-2017-9748" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9748" source="CVE"/>
        <reference ref_id="CVE-2017-16831" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-16831" source="CVE"/>
        <reference ref_id="CVE-2017-17121" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-17121" source="CVE"/>
        <reference ref_id="CVE-2017-7224" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7224" source="CVE"/>
        <reference ref_id="CVE-2017-9753" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9753" source="CVE"/>
        <reference ref_id="CVE-2017-16827" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-16827" source="CVE"/>
        <reference ref_id="CVE-2017-12450" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12450" source="CVE"/>
        <reference ref_id="CVE-2017-15022" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-15022" source="CVE"/>
        <reference ref_id="CVE-2017-8393" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-8393" source="CVE"/>
        <reference ref_id="CVE-2017-7614" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7614" source="CVE"/>
        <reference ref_id="CVE-2017-12455" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12455" source="CVE"/>
        <reference ref_id="CVE-2017-12799" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-12799" source="CVE"/>
        <reference ref_id="CVE-2017-7301" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7301" source="CVE"/>
        <reference ref_id="CVE-2017-7227" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-7227" source="CVE"/>
        <description>- CVE-2017-7223: Fix global buffer overflow (of size 1)
- CVE-2017-7224: Fix invalid write (of size 1) while disassembling
- CVE-2017-7225: Fix NULL pointer dereference and an invalid write
- CVE-2017-7226: Fix heap-based buffer over-read of size 4049
- CVE-2017-7227: Fix heap-based buffer overflow
- CVE-2017-7299: Fix invalid read (of size 8) in ELF reloc section
- CVE-2017-7300: Fix heap-based buffer over-read (off-by-one)
- CVE-2017-7301: Fix off-by-one vulnerability
- CVE-2017-7302: Fix invalid read (of size 4)
- CVE-2017-7614: Fix undefined behavior issue
- CVE-2017-8393: Fix global buffer over-read error
- CVE-2017-8394: Fix invalid read of size 4 due to NULL pointer dereferencing
- CVE-2017-8398: Fix invalid read of size 1 during dumping of debug information
- CVE-2017-8421: Fix memory leak vulnerability
- CVE-2017-9742: Fix buffer overflow
- CVE-2017-9744: Fix buffer overflow
- CVE-2017-9747: Fix buffer overflow
- CVE-2017-9748: Fix buffer overflow
- CVE-2017-9749: Fix buffer overflow
- CVE-2017-9753: Fix buffer overflow
- CVE-2017-9754: Fix buffer overflow
- CVE-2017-12448: Fix use after free
- CVE-2017-12449: Fix out of bounds heap read
- CVE-2017-12455: Fix out of bounds heap read
- CVE-2017-12457: Fix NULL dereference
- CVE-2017-12458: Fix out of bounds heap read
- CVE-2017-12459: Fix out of bounds heap write
- CVE-2017-12450: Fix out of bounds heap write
- CVE-2017-12452: Fix out of bounds heap read
- CVE-2017-12453: Fix out of bounds heap read
- CVE-2017-12454: Fix arbitrary memory read
- CVE-2017-12456: Fix out of bounds heap read
- CVE-2017-14333: Fix integer overflow, and hang because of a time-consuming loop
- CVE-2017-12451: Fix out of bounds stack read
- CVE-2017-12799: Fix buffer overflow
- CVE-2017-13710: Fix NULL pointer dereference
- CVE-2017-14130: Fix _bfd_elf_attr_strdup heap-based buffer over-read
- CVE-2017-14932: Fix infinite loop
- CVE-2017-14938: Fix excessive memory allocation
- CVE-2017-14940: Fix NULL pointer dereference
- CVE-2017-15020: Fix parse_die heap-based buffer over-read
- CVE-2017-15022: Fix bfd_hash_hash NULL pointer dereference
- CVE-2017-15225: Fix divide-by-zero error
- CVE-2017-15938: Fix find_abstract_instance_name invalid memory read, segmentation fault
- CVE-2017-15939: Fix NULL pointer dereference
- CVE-2017-15996: Fix buffer overflow on fuzzed archive header
- CVE-2017-16826: Fix invalid memory access
- CVE-2017-16827: slurp_symtab invalid free
- CVE-2017-16828: Fix integer overflow and heap-based buffer over-read
- CVE-2017-16831: Fix integer overflow or excessive memory allocation
- CVE-2017-17080: Fix bfd_getl32 heap-based buffer over-read
- CVE-2017-8396: Fix invalid read of size 1
- CVE-2017-17121: Fix memory access violation
- CVE-2017-17123: Fix NULL pointer dereference
- CVE-2017-17124: Fix excessive memory consumption or heap-based buffer overflow
- CVE-2017-17125: Fix buffer over-read</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-06"/>
          <updated date="2021-12-06"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-14130" impact="moderate" public="20170904">CVE-2017-14130</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-772" href="https://cve.tuxcare.com/els/cve/CVE-2017-15225" impact="moderate" public="20171010">CVE-2017-15225</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-14940" impact="moderate" public="20170930">CVE-2017-14940</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-16826" impact="important" public="20171115">CVE-2017-16826</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-8398" impact="important" public="20170501">CVE-2017-8398</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12449" impact="important" public="20170804">CVE-2017-12449</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9747" impact="important" public="20170619">CVE-2017-9747</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12458" impact="important" public="20170804">CVE-2017-12458</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12453" impact="important" public="20170804">CVE-2017-12453</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els/cve/CVE-2017-14932" impact="moderate" public="20170930">CVE-2017-14932</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-15938" impact="important" public="20171027">CVE-2017-15938</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-17123" impact="moderate" public="20171204">CVE-2017-17123</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12456" impact="important" public="20170804">CVE-2017-12456</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-7225" impact="important" public="20170322">CVE-2017-7225</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-8394" impact="important" public="20170501">CVE-2017-8394</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-772" href="https://cve.tuxcare.com/els/cve/CVE-2017-8421" impact="moderate" public="20170502">CVE-2017-8421</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9749" impact="important" public="20170619">CVE-2017-9749</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-15020" impact="important" public="20171005">CVE-2017-15020</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-15939" impact="moderate" public="20171027">CVE-2017-15939</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-15996" impact="important" public="20171029">CVE-2017-15996</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-17124" impact="important" public="20171204">CVE-2017-17124</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12454" impact="important" public="20170804">CVE-2017-12454</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12452" impact="important" public="20170804">CVE-2017-12452</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2017-8396" impact="important" public="20170501">CVE-2017-8396</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-7226" impact="critical" public="20170322">CVE-2017-7226</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-12457" impact="important" public="20170804">CVE-2017-12457</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9744" impact="important" public="20170619">CVE-2017-9744</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9742" impact="important" public="20170619">CVE-2017-9742</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9754" impact="important" public="20170619">CVE-2017-9754</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2017-14333" impact="important" public="20170912">CVE-2017-14333</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2017-14938" impact="moderate" public="20170930">CVE-2017-14938</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12451" impact="important" public="20170804">CVE-2017-12451</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2017-16828" impact="important" public="20171115">CVE-2017-16828</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-17080" impact="moderate" public="20171130">CVE-2017-17080</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-7302" impact="important" public="20170329">CVE-2017-7302</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-7300" impact="important" public="20170329">CVE-2017-7300</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-7299" impact="moderate" public="20170329">CVE-2017-7299</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-17125" impact="important" public="20171204">CVE-2017-17125</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2017-12459" impact="important" public="20170804">CVE-2017-12459</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2017-12448" impact="important" public="20170804">CVE-2017-12448</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-13710" impact="important" public="20170827">CVE-2017-13710</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-7223" impact="important" public="20170322">CVE-2017-7223</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9748" impact="important" public="20170619">CVE-2017-9748</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2017-16831" impact="important" public="20171115">CVE-2017-16831</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-17121" impact="important" public="20171204">CVE-2017-17121</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2017-7224" impact="moderate" public="20170322">CVE-2017-7224</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-9753" impact="important" public="20170619">CVE-2017-9753</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-16827" impact="important" public="20171115">CVE-2017-16827</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2017-12450" impact="important" public="20170804">CVE-2017-12450</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-15022" impact="moderate" public="20171005">CVE-2017-15022</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-8393" impact="important" public="20170501">CVE-2017-8393</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2017-7614" impact="critical" public="20170409">CVE-2017-7614</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2017-12455" impact="important" public="20170804">CVE-2017-12455</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-12799" impact="important" public="20170810">CVE-2017-12799</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2017-7301" impact="important" public="20170329">CVE-2017-7301</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2017-7227" impact="important" public="20170322">CVE-2017-7227</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1638803819001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1638803819004"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1640621287" version="1">
      <metadata>
        <title>Fix of 36 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1640621287" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1640621287" source="CLSA"/>
        <reference ref_id="CVE-2018-20671" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-20671" source="CVE"/>
        <reference ref_id="CVE-2018-8945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-8945" source="CVE"/>
        <reference ref_id="CVE-2018-18606" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18606" source="CVE"/>
        <reference ref_id="CVE-2019-9075" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-9075" source="CVE"/>
        <reference ref_id="CVE-2019-12972" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-12972" source="CVE"/>
        <reference ref_id="CVE-2018-20623" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-20623" source="CVE"/>
        <reference ref_id="CVE-2016-4487" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4487" source="CVE"/>
        <reference ref_id="CVE-2018-6759" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-6759" source="CVE"/>
        <reference ref_id="CVE-2018-7642" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-7642" source="CVE"/>
        <reference ref_id="CVE-2018-7643" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-7643" source="CVE"/>
        <reference ref_id="CVE-2018-13033" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-13033" source="CVE"/>
        <reference ref_id="CVE-2018-18309" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18309" source="CVE"/>
        <reference ref_id="CVE-2018-1000876" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-1000876" source="CVE"/>
        <reference ref_id="CVE-2016-4489" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4489" source="CVE"/>
        <reference ref_id="CVE-2016-4492" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4492" source="CVE"/>
        <reference ref_id="CVE-2019-14444" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-14444" source="CVE"/>
        <reference ref_id="CVE-2018-10373" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-10373" source="CVE"/>
        <reference ref_id="CVE-2019-17450" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-17450" source="CVE"/>
        <reference ref_id="CVE-2018-6543" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-6543" source="CVE"/>
        <reference ref_id="CVE-2018-7568" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-7568" source="CVE"/>
        <reference ref_id="CVE-2019-9077" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-9077" source="CVE"/>
        <reference ref_id="CVE-2018-6323" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-6323" source="CVE"/>
        <reference ref_id="CVE-2018-18607" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18607" source="CVE"/>
        <reference ref_id="CVE-2018-19932" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-19932" source="CVE"/>
        <reference ref_id="CVE-2018-19931" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-19931" source="CVE"/>
        <reference ref_id="CVE-2016-4488" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4488" source="CVE"/>
        <reference ref_id="CVE-2018-20002" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-20002" source="CVE"/>
        <reference ref_id="CVE-2019-9073" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-9073" source="CVE"/>
        <reference ref_id="CVE-2018-7569" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-7569" source="CVE"/>
        <reference ref_id="CVE-2016-4493" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4493" source="CVE"/>
        <reference ref_id="CVE-2016-4490" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4490" source="CVE"/>
        <reference ref_id="CVE-2016-6131" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-6131" source="CVE"/>
        <reference ref_id="CVE-2016-2226" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-2226" source="CVE"/>
        <reference ref_id="CVE-2018-10535" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-10535" source="CVE"/>
        <reference ref_id="CVE-2018-7208" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-7208" source="CVE"/>
        <reference ref_id="CVE-2018-18605" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18605" source="CVE"/>
        <description>- CVE-2018-6323: Fix unsigned integer overflow
- CVE-2018-19931: Fix heap-based buffer overflow in bfd_elf32_swap_phdr_in
- CVE-2018-6543: Fix integer overflow
- CVE-2018-20671: Fix integer overflow vulnerability
- CVE-2018-6759: Fix segmentation fault
- CVE-2018-7208: Fix segmentation fault
- CVE-2018-7568: Fix integer overflow
- CVE-2018-7569: Fix integer underflow or overflow
- CVE-2018-7642: Fix aout_32_swap_std_reloc_out NULL pointer dereference
- CVE-2018-7643: Fix integer overflow
- CVE-2018-8945: Fix segmentation fault
- CVE-2018-13033: Fix excessive memory allocation
- CVE-2018-10373: Fix NULL pointer dereference
- CVE-2018-10535: Fix NULL pointer dereference
- CVE-2018-18309: Fix invalid memory address dereference
- CVE-2018-18605: Fix mishandles section merges
- CVE-2018-18606: Fix NULL pointer dereference
- CVE-2018-18607: Fix NULL pointer dereference in elf_link_input_bfd
- CVE-2018-19932: Fix integer overflow and infinite loop
- CVE-2018-20002: Fix memory consumption
- CVE-2018-20623: Fix use-after-free in the error function
- CVE-2018-1000876: Fix integer overflow trigger heap overflow
- CVE-2019-9073: Fix excessive memory allocation
- CVE-2019-9075: Fix heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap
- CVE-2019-9077: Fix heap-based buffer overflow in process_mips_specific
- CVE-2019-12972: Fix heap-based buffer over-read in _bfd_doprnt
- CVE-2019-14444: Fix integer overflow
- CVE-2019-17450: Fix infinite recursion
- CVE-2016-2226: Fix integer overflow in the string_appends function in cplus-dem.c
- CVE-2016-4487: Fix use-after-free vulnerability in libiberty
- CVE-2016-4488: Fix use-after-free vulnerability in libiberty
- CVE-2016-4489: Fix integer overflow in libiberty
- CVE-2016-4490: Fix integer overflow in cp-demangle.c in libiberty
- CVE-2016-4492: Fix buffer overflow in the do_type function in cplus-dem.c in libiberty
- CVE-2016-4493: Fix out-of-bounds read in demangle_template_value_parm and do_hpacc_template_literal
- CVE-2016-6131: Fix infinite loop, stack overflow</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-16"/>
          <updated date="2021-12-16"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2018-20671" impact="moderate" public="20190104">CVE-2018-20671</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2018-8945" impact="moderate" public="20180322">CVE-2018-8945</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-18606" impact="moderate" public="20181023">CVE-2018-18606</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2019-9075" impact="important" public="20190224">CVE-2019-9075</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2019-12972" impact="moderate" public="20190626">CVE-2019-12972</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2018-20623" impact="moderate" public="20181231">CVE-2018-20623</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2016-4487" impact="moderate" public="20170224">CVE-2016-4487</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2018-6759" impact="moderate" public="20180206">CVE-2018-6759</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-7642" impact="moderate" public="20180302">CVE-2018-7642</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-7643" impact="important" public="20180302">CVE-2018-7643</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2018-13033" impact="moderate" public="20180701">CVE-2018-13033</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2018-18309" impact="moderate" public="20181015">CVE-2018-18309</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2018-1000876" impact="important" public="20181220">CVE-2018-1000876</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2016-4489" impact="moderate" public="20170224">CVE-2016-4489</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2016-4492" impact="moderate" public="20170224">CVE-2016-4492</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2019-14444" impact="moderate" public="20190730">CVE-2019-14444</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-10373" impact="moderate" public="20180425">CVE-2018-10373</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2019-17450" impact="moderate" public="20191010">CVE-2019-17450</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-6543" impact="important" public="20180202">CVE-2018-6543</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-7568" impact="moderate" public="20180228">CVE-2018-7568</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2019-9077" impact="important" public="20190224">CVE-2019-9077</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-6323" impact="important" public="20180126">CVE-2018-6323</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-18607" impact="moderate" public="20181023">CVE-2018-18607</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-19932" impact="moderate" public="20181207">CVE-2018-19932</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2018-19931" impact="important" public="20181207">CVE-2018-19931</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2016-4488" impact="moderate" public="20170224">CVE-2016-4488</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-772" href="https://cve.tuxcare.com/els/cve/CVE-2018-20002" impact="moderate" public="20181210">CVE-2018-20002</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2019-9073" impact="moderate" public="20190224">CVE-2019-9073</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-7569" impact="moderate" public="20180228">CVE-2018-7569</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2016-4493" impact="moderate" public="20170224">CVE-2016-4493</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2016-4490" impact="moderate" public="20170224">CVE-2016-4490</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2016-6131" impact="important" public="20170207">CVE-2016-6131</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2016-2226" impact="important" public="20170224">CVE-2016-2226</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-10535" impact="moderate" public="20180429">CVE-2018-10535</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2018-7208" impact="important" public="20180218">CVE-2018-7208</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2018-18605" impact="moderate" public="20181023">CVE-2018-18605</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1640621287001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1640621287002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1641904053" version="1">
      <metadata>
        <title>Fix of 14 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1641904053" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1641904053" source="CLSA"/>
        <reference ref_id="CVE-2018-9138" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-9138" source="CVE"/>
        <reference ref_id="CVE-2021-45078" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-45078" source="CVE"/>
        <reference ref_id="CVE-2018-12697" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-12697" source="CVE"/>
        <reference ref_id="CVE-2018-18483" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18483" source="CVE"/>
        <reference ref_id="CVE-2018-18701" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18701" source="CVE"/>
        <reference ref_id="CVE-2018-18484" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18484" source="CVE"/>
        <reference ref_id="CVE-2018-17985" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-17985" source="CVE"/>
        <reference ref_id="CVE-2018-18700" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18700" source="CVE"/>
        <reference ref_id="CVE-2018-12700" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-12700" source="CVE"/>
        <reference ref_id="CVE-2018-12934" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-12934" source="CVE"/>
        <reference ref_id="CVE-2018-17794" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-17794" source="CVE"/>
        <reference ref_id="CVE-2018-12641" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-12641" source="CVE"/>
        <reference ref_id="CVE-2018-12698" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-12698" source="CVE"/>
        <reference ref_id="CVE-2018-12699" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-12699" source="CVE"/>
        <description>- CVE-2018-9138: Fix stack exhaustion
- CVE-2018-12641: Fix stack exhaustion
- CVE-2018-12697: Fix NULL pointer dereference
- CVE-2018-12698: Fix memory consumption
- CVE-2018-12699: Fix heap-based buffer overflow
- CVE-2018-12700: Fix infinite recursion
- CVE-2018-17794: Fix NULL pointer dereference
- CVE-2018-17985: Fix recursive calls
- CVE-2018-18484: Fix stack exhaustion
- CVE-2018-18700: Fix stack consumption vulnerability
- CVE-2018-18701: Fix infinite recursion
- CVE-2018-18483: Fix malloc call with the result of an integer-overflowing
- CVE-2018-12934: Fix excessive memory consumption
- CVE-2021-45078: Fix heap-based buffer overflow</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-12-29"/>
          <updated date="2021-12-29"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2018-9138" impact="moderate" public="20180330">CVE-2018-9138</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-45078" impact="important" public="20211215">CVE-2021-45078</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-12697" impact="important" public="20180623">CVE-2018-12697</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-18483" impact="important" public="20181018">CVE-2018-18483</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els/cve/CVE-2018-18701" impact="moderate" public="20181029">CVE-2018-18701</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2018-18484" impact="moderate" public="20181018">CVE-2018-18484</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2018-17985" impact="moderate" public="20181004">CVE-2018-17985</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els/cve/CVE-2018-18700" impact="moderate" public="20181029">CVE-2018-18700</cve>
          <cve cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2018-12700" impact="low" public="20180411">CVE-2018-12700</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2018-12934" impact="important" public="20180628">CVE-2018-12934</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2018-17794" impact="moderate" public="20180930">CVE-2018-17794</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2018-12641" impact="moderate" public="20180622">CVE-2018-12641</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2018-12698" impact="important" public="20180623">CVE-2018-12698</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2018-12699" impact="critical" public="20180623">CVE-2018-12699</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1641904053001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1641904053002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1633442827" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-3487</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1633442827" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1633442827" source="CLSA"/>
        <reference ref_id="CVE-2021-3487" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-3487" source="CVE"/>
        <description>- CVE-2021-3487: excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section().</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-10-05"/>
          <updated date="2021-10-05"/>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2021-3487" impact="moderate" public="20210415">CVE-2021-3487</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 0:2.20.51.0.2-5.49.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442827001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 0:2.20.51.0.2-5.49.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1633442827002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1649171018" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2022-0547</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1649171018" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1649171018" source="CLSA"/>
        <reference ref_id="CVE-2022-0547" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0547" source="CVE"/>
        <description>- CVE-2022-0547: Fix authentication bypass via multiple deferred authentication plug-ins</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-05"/>
          <updated date="2022-04-05"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-287" href="https://cve.tuxcare.com/els/cve/CVE-2022-0547" impact="critical" public="20220318">CVE-2022-0547</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openvpn is earlier than 0:2.4.9-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1649171018001"/>
        <criteria operator="AND">
          <criterion comment="openvpn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649171018002"/>
          <criterion comment="openvpn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649171018003"/>
        </criteria>
        <criterion comment="openvpn-devel is earlier than 0:2.4.9-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1649171018004"/>
        <criteria operator="AND">
          <criterion comment="openvpn-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649171018005"/>
          <criterion comment="openvpn-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649171018006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1638803748" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-27212</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1638803748" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1638803748" source="CLSA"/>
        <reference ref_id="CVE-2021-27212" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-27212" source="CVE"/>
        <description>- CVE-2021-27212: fix DoS via malicious packet</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-11-24"/>
          <updated date="2021-11-24"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2021-27212" impact="important" public="20210214">CVE-2021-27212</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openldap is earlier than 0:2.4.40-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1638803748001"/>
        <criteria operator="AND">
          <criterion comment="openldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748002"/>
          <criterion comment="openldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748003"/>
        </criteria>
        <criterion comment="openldap-clients is earlier than 0:2.4.40-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1638803748004"/>
        <criteria operator="AND">
          <criterion comment="openldap-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748005"/>
          <criterion comment="openldap-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748006"/>
        </criteria>
        <criterion comment="openldap-devel is earlier than 0:2.4.40-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1638803748007"/>
        <criteria operator="AND">
          <criterion comment="openldap-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748008"/>
          <criterion comment="openldap-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748009"/>
        </criteria>
        <criterion comment="openldap-servers is earlier than 0:2.4.40-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1638803748010"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748011"/>
          <criterion comment="openldap-servers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748012"/>
        </criteria>
        <criterion comment="openldap-servers-sql is earlier than 0:2.4.40-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1638803748013"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers-sql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748014"/>
          <criterion comment="openldap-servers-sql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1652986174" version="1">
      <metadata>
        <title/>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1652986174" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1652986174" source="CLSA"/>
        <reference ref_id="CVE-2022-29155" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-29155" source="CVE"/>
        <description>- CVE-2022-29155: fix SQL injection vulnerability caused by LDAP search operation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-05-19"/>
          <updated date="2022-05-19"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-89" href="https://cve.tuxcare.com/els/cve/CVE-2022-29155" impact="critical" public="20220504">CVE-2022-29155</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openldap is earlier than 0:2.4.40-16.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1652986174001"/>
        <criteria operator="AND">
          <criterion comment="openldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748002"/>
          <criterion comment="openldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748003"/>
        </criteria>
        <criterion comment="openldap-clients is earlier than 0:2.4.40-16.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1652986174002"/>
        <criteria operator="AND">
          <criterion comment="openldap-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748005"/>
          <criterion comment="openldap-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748006"/>
        </criteria>
        <criterion comment="openldap-devel is earlier than 0:2.4.40-16.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1652986174003"/>
        <criteria operator="AND">
          <criterion comment="openldap-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748008"/>
          <criterion comment="openldap-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748009"/>
        </criteria>
        <criterion comment="openldap-servers is earlier than 0:2.4.40-16.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1652986174004"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748011"/>
          <criterion comment="openldap-servers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748012"/>
        </criteria>
        <criterion comment="openldap-servers-sql is earlier than 0:2.4.40-16.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1652986174005"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers-sql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748014"/>
          <criterion comment="openldap-servers-sql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1650575956" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-28651</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1650575956" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1650575956" source="CLSA"/>
        <reference ref_id="CVE-2021-28651" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-28651" source="CVE"/>
        <description>- CVE-2021-28651: fix memory leak leading to denial of service</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-04-21"/>
          <updated date="2022-04-21"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://cve.tuxcare.com/els/cve/CVE-2021-28651" impact="important" public="20210527">CVE-2021-28651</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-25.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1650575956001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1628782974" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-8450, CVE-2020-8517, CVE-2020-8449</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1628782974" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1628782974" source="CLSA"/>
        <reference ref_id="CVE-2020-25097" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25097" source="CVE"/>
        <reference ref_id="CVE-2020-8450" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8450" source="CVE"/>
        <reference ref_id="CVE-2020-8517" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8517" source="CVE"/>
        <reference ref_id="CVE-2020-24606" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-24606" source="CVE"/>
        <reference ref_id="CVE-2020-8449" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8449" source="CVE"/>
        <reference ref_id="CVE-2020-11945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-11945" source="CVE"/>
        <description>- CVE-2020-8449: fix improper HTTP request validation allowing access to 
  resources which are prohibited by security filters
- CVE-2020-8450: fix incorrect buffer managment leading to buffer overflow
- CVE-2020-8517: fix incorrect input validation allowing writing outside of buffer
  and leading to denial of service</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-08-12"/>
          <updated date="2021-08-12"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-25097" impact="important" public="20210319">CVE-2020-25097</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2020-8450" impact="important" public="20200204">CVE-2020-8450</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-8517" impact="important" public="20200204">CVE-2020-8517</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-667" href="https://cve.tuxcare.com/els/cve/CVE-2020-24606" impact="important" public="20200824">CVE-2020-24606</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-668" href="https://cve.tuxcare.com/els/cve/CVE-2020-8449" impact="important" public="20200204">CVE-2020-8449</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-11945" impact="critical" public="20200423">CVE-2020-11945</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-29.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1628782974001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1629902677" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2020-14058, CVE-2020-15049</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1629902677" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1629902677" source="CLSA"/>
        <reference ref_id="CVE-2020-15049" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-15049" source="CVE"/>
        <reference ref_id="CVE-2020-14058" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14058" source="CVE"/>
        <description>- CVE-2020-14058: fix handling of unknown SSL errors which resulted in denial of
  service
- CVE-2020-15049: fix incorrect validation of Content-Length field leading to
  Http smuggling and Poisoning attack</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-08-25"/>
          <updated date="2021-08-25"/>
          <cve cvss2="6.5/AV:N/AC:L/Au:S/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els/cve/CVE-2020-15049" impact="important" public="20200630">CVE-2020-15049</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2020-14058" impact="important" public="20200630">CVE-2020-14058</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.cloudlinux.els" test_ref="oval:com.tuxcare.clsa:tst:1629902677001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1617641265" version="1">
      <metadata>
        <title>Fix of Add fix for CVE-2020-29599</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1617641265" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1617641265" source="CLSA"/>
        <reference ref_id="CVE-2020-29599" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-29599" source="CVE"/>
        <description>- Add fix for CVE-2020-29599</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-04-05"/>
          <updated date="2021-04-05"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-91" href="https://cve.tuxcare.com/els/cve/CVE-2020-29599" impact="important" public="20201207">CVE-2020-29599</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="ImageMagick is earlier than 0:6.7.2.7-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1617641265001"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265002"/>
          <criterion comment="ImageMagick isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265003"/>
        </criteria>
        <criterion comment="ImageMagick-c++ is earlier than 0:6.7.2.7-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1617641265004"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-c++ isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265005"/>
          <criterion comment="ImageMagick-c++ isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265006"/>
        </criteria>
        <criterion comment="ImageMagick-c++-devel is earlier than 0:6.7.2.7-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1617641265007"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-c++-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265008"/>
          <criterion comment="ImageMagick-c++-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265009"/>
        </criteria>
        <criterion comment="ImageMagick-devel is earlier than 0:6.7.2.7-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1617641265010"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265011"/>
          <criterion comment="ImageMagick-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265012"/>
        </criteria>
        <criterion comment="ImageMagick-doc is earlier than 0:6.7.2.7-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1617641265013"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265014"/>
          <criterion comment="ImageMagick-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265015"/>
        </criteria>
        <criterion comment="ImageMagick-perl is earlier than 0:6.7.2.7-7.el6" test_ref="oval:com.tuxcare.clsa:tst:1617641265016"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265017"/>
          <criterion comment="ImageMagick-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1643211942" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-4034</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1643211942" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1643211942" source="CLSA"/>
        <reference ref_id="CVE-2021-4034" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4034" source="CVE"/>
        <description>- CVE-2021-4034: pkexec: argv overflow results in local privilege esc.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-01-26"/>
          <updated date="2022-01-26"/>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-4034" impact="important" public="20220128">CVE-2021-4034</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="polkit is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643211942001"/>
        <criteria operator="AND">
          <criterion comment="polkit isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643211942002"/>
          <criterion comment="polkit isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643211942003"/>
        </criteria>
        <criterion comment="polkit-desktop-policy is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643211942004"/>
        <criteria operator="AND">
          <criterion comment="polkit-desktop-policy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643211942005"/>
          <criterion comment="polkit-desktop-policy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643211942006"/>
        </criteria>
        <criterion comment="polkit-devel is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643211942007"/>
        <criteria operator="AND">
          <criterion comment="polkit-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643211942008"/>
          <criterion comment="polkit-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643211942009"/>
        </criteria>
        <criterion comment="polkit-docs is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1643211942010"/>
        <criteria operator="AND">
          <criterion comment="polkit-docs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643211942011"/>
          <criterion comment="polkit-docs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643211942012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1618497131" version="1">
      <metadata>
        <title>Fix of CVE: CVE-2021-26937</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2021:1618497131" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2021:1618497131" source="CLSA"/>
        <reference ref_id="CVE-2021-26937" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-26937" source="CVE"/>
        <description>- fix CVE-2021-26937</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2021-04-15"/>
          <updated date="2021-04-15"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-88" href="https://cve.tuxcare.com/els/cve/CVE-2021-26937" impact="critical" public="20210209">CVE-2021-26937</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="screen is earlier than 0:4.0.3-20.el6.cloudlinux.els6" test_ref="oval:com.tuxcare.clsa:tst:1618497131001"/>
        <criteria operator="AND">
          <criterion comment="screen isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1618497131002"/>
          <criterion comment="screen isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1618497131003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1658853743" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-2289, CVE-2022-2304</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1658853743" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1658853743" source="CLSA"/>
        <reference ref_id="CVE-2022-2289" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2289" source="CVE"/>
        <reference ref_id="CVE-2022-2304" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2304" source="CVE"/>
        <description>- CVE-2022-2289: bail out when diff pointer is no longer valid to avoid accessing
  freed memory with diff put
- CVE-2022-2304: limit the word length to avoid out of bound accesing</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-26"/>
          <updated date="2022-07-26"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-2289" impact="important" public="20220703">CVE-2022-2289</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://cve.tuxcare.com/els/cve/CVE-2022-2304" impact="important" public="20220705">CVE-2022-2304</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1658853743001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1658853743002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1658853743003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1658853743004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1658853743005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1659018147" version="1">
      <metadata>
        <title>Fixed CVE-2021-22543 in kernel</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1659018147" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1659018147" source="CLSA"/>
        <reference ref_id="CVE-2021-22543" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-22543" source="CVE"/>
        <description>- KVM: do not allow mapping valid but non-reference-counted pages {CVE-2021-22543}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-07-28"/>
          <updated date="2022-07-28"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2021-22543" impact="important" public="20210526">CVE-2021-22543</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1659018147001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1659018147008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1659638796" version="1">
      <metadata>
        <title>Fixed CVEs in java-1.8.0-openjdk: CVE-2022-34169, CVE-2022-21541, CVE-2022-21540</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1659638796" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1659638796" source="CLSA"/>
        <reference ref_id="CVE-2022-34169" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-34169" source="CVE"/>
        <reference ref_id="CVE-2022-21540" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21540" source="CVE"/>
        <reference ref_id="CVE-2022-21541" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21541" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u342-b07. That fixes following CVEs:
- CVE-2022-34169: Integer truncation issue in Xalan-J
- CVE-2022-21540: Class compilation issue
- CVE-2022-21541: Improper restriction of MethodHandle.invokeBasic()
- Update tzdata requirement to 2022a to match JDK-8283350
- Remove patch for MakeBase.gmk cause issue was fixed in sources
- Correct parameters passing to CheckVendor test</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-04"/>
          <updated date="2022-08-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-681" href="https://cve.tuxcare.com/els/cve/CVE-2022-34169" impact="critical" public="20220719">CVE-2022-34169</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21540" impact="moderate" public="20220719">CVE-2022-21540</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21541" impact="moderate" public="20220719">CVE-2022-21541</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1659638796012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1659638964" version="1">
      <metadata>
        <title>Fixed CVE-2021-21702 in php</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1659638964" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1659638964" source="CLSA"/>
        <reference ref_id="CVE-2021-21702" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-21702" source="CVE"/>
        <description>- CVE-2021-21702: Fix null pointer dereference in Soap Client</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-04"/>
          <updated date="2022-08-04"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2021-21702" impact="important" public="20210215">CVE-2021-21702</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1659638964027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1659639100" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-2344, CVE-2022-2343, CVE-2022-2345, CVE-2022-2522</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1659639100" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1659639100" source="CLSA"/>
        <reference ref_id="CVE-2022-2343" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2343" source="CVE"/>
        <reference ref_id="CVE-2022-2345" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2345" source="CVE"/>
        <reference ref_id="CVE-2022-2522" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2522" source="CVE"/>
        <reference ref_id="CVE-2022-2344" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2344" source="CVE"/>
        <description>- CVE-2022-2345: fix using freed memory with recursive substitute
- CVE-2022-2344: fix reading past end of completion with duplicate match
- CVE-2022-2343: fix reading past end of completion with a long line and 'infercase'
  set
- CVE-2022-2522: fix accessing uninitialized memory when completing long line</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-04"/>
          <updated date="2022-08-04"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2343" impact="important" public="20220708">CVE-2022-2343</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-2345" impact="important" public="20220708">CVE-2022-2345</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2522" impact="important" public="20220725">CVE-2022-2522</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2344" impact="important" public="20220708">CVE-2022-2344</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1659639100001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1659639100002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1659639100003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1659639100004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1659639100005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1660761670" version="1">
      <metadata>
        <title>Fixed CVEs in exim: CVE-2022-37452, CVE-2022-37451</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1660761670" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1660761670" source="CLSA"/>
        <reference ref_id="CVE-2022-37452" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-37452" source="CVE"/>
        <reference ref_id="CVE-2022-37451" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-37451" source="CVE"/>
        <description>- CVE-2022-37452: fix heap-based buffer overflow for the alias list in
  host_name_lookup()
- CVE-2022-37451: fix invalid free in pam_converse()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-17"/>
          <updated date="2022-08-17"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-37452" impact="critical" public="20220807">CVE-2022-37452</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-763" href="https://cve.tuxcare.com/els/cve/CVE-2022-37451" impact="important" public="20220806">CVE-2022-37451</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660761670001"/>
        <criteria operator="AND">
          <criterion comment="exim isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670002"/>
          <criterion comment="exim isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670003"/>
        </criteria>
        <criterion comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660761670004"/>
        <criteria operator="AND">
          <criterion comment="exim-greylist isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670005"/>
          <criterion comment="exim-greylist isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670006"/>
        </criteria>
        <criterion comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660761670007"/>
        <criteria operator="AND">
          <criterion comment="exim-mon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670008"/>
          <criterion comment="exim-mon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670009"/>
        </criteria>
        <criterion comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660761670010"/>
        <criteria operator="AND">
          <criterion comment="exim-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670011"/>
          <criterion comment="exim-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670012"/>
        </criteria>
        <criterion comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660761670013"/>
        <criteria operator="AND">
          <criterion comment="exim-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670014"/>
          <criterion comment="exim-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1660761947" version="1">
      <metadata>
        <title>Fixed CVE-2022-29154 in rsync</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1660761947" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1660761947" source="CLSA"/>
        <reference ref_id="CVE-2022-29154" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-29154" source="CVE"/>
        <description>- CVE-2022-29154: fix arbitrary file write vulnerability via malicious rysnc
  server (MITM attack)
- Add '%check
unset DISPLAY
' section but disable broken 'daemon' and 'hardlinks' tests</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-17"/>
          <updated date="2022-08-17"/>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-862" href="https://cve.tuxcare.com/els/cve/CVE-2022-29154" impact="important" public="20220802">CVE-2022-29154</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660761947001"/>
        <criteria operator="AND">
          <criterion comment="rsync isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653004535002"/>
          <criterion comment="rsync isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653004535003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1660762053" version="1">
      <metadata>
        <title>Fixed CVE-2022-37434 in zlib</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1660762053" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1660762053" source="CLSA"/>
        <reference ref_id="CVE-2022-37434" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-37434" source="CVE"/>
        <description>- CVE-2022-37434: fix possible buffer overflow when getting a gzip header extra field
  with inflate()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-17"/>
          <updated date="2022-08-17"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-37434" impact="critical" public="20220805">CVE-2022-37434</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660762053001"/>
        <criteria operator="AND">
          <criterion comment="minizip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231002"/>
          <criterion comment="minizip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231003"/>
        </criteria>
        <criterion comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660762053002"/>
        <criteria operator="AND">
          <criterion comment="minizip-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231005"/>
          <criterion comment="minizip-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231006"/>
        </criteria>
        <criterion comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660762053003"/>
        <criteria operator="AND">
          <criterion comment="zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231008"/>
          <criterion comment="zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231009"/>
        </criteria>
        <criterion comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660762053004"/>
        <criteria operator="AND">
          <criterion comment="zlib-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231011"/>
          <criterion comment="zlib-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231012"/>
        </criteria>
        <criterion comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1660762053005"/>
        <criteria operator="AND">
          <criterion comment="zlib-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231014"/>
          <criterion comment="zlib-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1660762248" version="1">
      <metadata>
        <title>Fixed 13 CVEs in expat</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1660762248" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1660762248" source="CLSA"/>
        <reference ref_id="CVE-2022-22825" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22825" source="CVE"/>
        <reference ref_id="CVE-2021-46143" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-46143" source="CVE"/>
        <reference ref_id="CVE-2021-45960" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-45960" source="CVE"/>
        <reference ref_id="CVE-2022-23990" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23990" source="CVE"/>
        <reference ref_id="CVE-2022-25235" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-25235" source="CVE"/>
        <reference ref_id="CVE-2022-22826" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22826" source="CVE"/>
        <reference ref_id="CVE-2022-23852" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23852" source="CVE"/>
        <reference ref_id="CVE-2022-22827" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22827" source="CVE"/>
        <reference ref_id="CVE-2022-25236" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-25236" source="CVE"/>
        <reference ref_id="CVE-2022-22824" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22824" source="CVE"/>
        <reference ref_id="CVE-2022-22823" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22823" source="CVE"/>
        <reference ref_id="CVE-2022-22822" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-22822" source="CVE"/>
        <reference ref_id="CVE-2022-25315" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-25315" source="CVE"/>
        <description>- CVE-2022-25236: Fix insertion of namespace-separator characters into
  namespace URIs
- CVE-2022-25235: Fix malformed UTF-8 sequences which can lead to
  arbitrary code execution
- CVE-2022-25315: Fix integer overflow in storeRawNames()
- CVE-2022-22822: Fix integer overflow in addBinding()
- CVE-2022-22823: Fix integer overflow in build_model()
- CVE-2022-22824: Fix integer overflow in defineAttribute()
- CVE-2022-22825: Fix integer overflow in lookup()
- CVE-2022-22826: Fix integer overflow in nextScaffoldPart()
- CVE-2022-22827: Fix integer overflow in storeAtts()
- CVE-2022-23852: Fix integer overflow in XML_GetBuffer()
- CVE-2021-46143: Fix integer overflow on m_groupSize in doProlog()
- CVE-2021-45960: Fix troublesome left shifts in storeAtts()
- CVE-2022-23990: Fix integer overflow in doProlog()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-17"/>
          <updated date="2022-08-17"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22825" impact="important" public="20220110">CVE-2022-22825</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2021-46143" impact="important" public="20220106">CVE-2021-46143</cve>
          <cve cvss2="9.0/AV:N/AC:L/Au:S/C:C/I:C/A:C" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-682" href="https://cve.tuxcare.com/els/cve/CVE-2021-45960" impact="important" public="20220101">CVE-2021-45960</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-23990" impact="critical" public="20220126">CVE-2022-23990</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-116" href="https://cve.tuxcare.com/els/cve/CVE-2022-25235" impact="critical" public="20220216">CVE-2022-25235</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22826" impact="important" public="20220110">CVE-2022-22826</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-23852" impact="critical" public="20220124">CVE-2022-23852</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22827" impact="important" public="20220110">CVE-2022-22827</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-668" href="https://cve.tuxcare.com/els/cve/CVE-2022-25236" impact="critical" public="20220216">CVE-2022-25236</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22824" impact="critical" public="20220110">CVE-2022-22824</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22823" impact="critical" public="20220110">CVE-2022-22823</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-22822" impact="critical" public="20220110">CVE-2022-22822</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-25315" impact="critical" public="20220218">CVE-2022-25315</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1660762248001"/>
        <criteria operator="AND">
          <criterion comment="expat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248002"/>
          <criterion comment="expat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248003"/>
        </criteria>
        <criterion comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1660762248004"/>
        <criteria operator="AND">
          <criterion comment="expat-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248005"/>
          <criterion comment="expat-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1660762683" version="1">
      <metadata>
        <title>Fixed CVE-2022-2581 in vim</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1660762683" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1660762683" source="CLSA"/>
        <reference ref_id="CVE-2022-2581" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2581" source="CVE"/>
        <description>- CVE-2022-2581: fix illegal memory access when pattern starts with illegal byte</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-17"/>
          <updated date="2022-08-17"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2581" impact="important" public="20220801">CVE-2022-2581</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1660762683001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1660762683002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1660762683003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1660762683004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1660762683005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1661176564" version="1">
      <metadata>
        <title>Fixed 50 CVEs in java-1.7.0-openjdk</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1661176564" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1661176564" source="CLSA"/>
        <reference ref_id="CVE-2022-21365" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21365" source="CVE"/>
        <reference ref_id="CVE-2022-21296" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21296" source="CVE"/>
        <reference ref_id="CVE-2022-21360" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21360" source="CVE"/>
        <reference ref_id="CVE-2022-21341" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21341" source="CVE"/>
        <reference ref_id="CVE-2021-2163" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-2163" source="CVE"/>
        <reference ref_id="CVE-2022-21282" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21282" source="CVE"/>
        <reference ref_id="CVE-2022-21340" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21340" source="CVE"/>
        <reference ref_id="CVE-2022-21305" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21305" source="CVE"/>
        <reference ref_id="CVE-2022-21293" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21293" source="CVE"/>
        <reference ref_id="CVE-2022-21540" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21540" source="CVE"/>
        <reference ref_id="CVE-2022-21541" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21541" source="CVE"/>
        <reference ref_id="CVE-2022-34169" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-34169" source="CVE"/>
        <reference ref_id="CVE-2022-21283" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21283" source="CVE"/>
        <reference ref_id="CVE-2022-21496" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21496" source="CVE"/>
        <reference ref_id="CVE-2021-35550" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35550" source="CVE"/>
        <reference ref_id="CVE-2021-35561" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35561" source="CVE"/>
        <reference ref_id="CVE-2021-35586" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35586" source="CVE"/>
        <reference ref_id="CVE-2021-35603" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35603" source="CVE"/>
        <reference ref_id="CVE-2020-14797" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14797" source="CVE"/>
        <reference ref_id="CVE-2020-14578" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14578" source="CVE"/>
        <reference ref_id="CVE-2020-14577" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14577" source="CVE"/>
        <reference ref_id="CVE-2020-14583" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14583" source="CVE"/>
        <reference ref_id="CVE-2020-14579" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14579" source="CVE"/>
        <reference ref_id="CVE-2020-14798" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14798" source="CVE"/>
        <reference ref_id="CVE-2020-14792" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14792" source="CVE"/>
        <reference ref_id="CVE-2020-14779" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14779" source="CVE"/>
        <reference ref_id="CVE-2021-2369" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-2369" source="CVE"/>
        <reference ref_id="CVE-2021-35588" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35588" source="CVE"/>
        <reference ref_id="CVE-2022-21476" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21476" source="CVE"/>
        <reference ref_id="CVE-2022-21294" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21294" source="CVE"/>
        <reference ref_id="CVE-2021-35556" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35556" source="CVE"/>
        <reference ref_id="CVE-2022-21426" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21426" source="CVE"/>
        <reference ref_id="CVE-2022-21434" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21434" source="CVE"/>
        <reference ref_id="CVE-2021-2161" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-2161" source="CVE"/>
        <reference ref_id="CVE-2020-14621" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14621" source="CVE"/>
        <reference ref_id="CVE-2020-14593" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14593" source="CVE"/>
        <reference ref_id="CVE-2020-14581" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14581" source="CVE"/>
        <reference ref_id="CVE-2020-14803" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14803" source="CVE"/>
        <reference ref_id="CVE-2020-14796" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14796" source="CVE"/>
        <reference ref_id="CVE-2020-14782" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14782" source="CVE"/>
        <reference ref_id="CVE-2020-14781" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14781" source="CVE"/>
        <reference ref_id="CVE-2021-2341" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-2341" source="CVE"/>
        <reference ref_id="CVE-2021-35565" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35565" source="CVE"/>
        <reference ref_id="CVE-2021-35564" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35564" source="CVE"/>
        <reference ref_id="CVE-2021-35559" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-35559" source="CVE"/>
        <reference ref_id="CVE-2022-21443" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21443" source="CVE"/>
        <reference ref_id="CVE-2022-21299" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21299" source="CVE"/>
        <reference ref_id="CVE-2022-21349" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21349" source="CVE"/>
        <reference ref_id="CVE-2022-21248" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21248" source="CVE"/>
        <reference ref_id="CVE-2021-2432" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-2432" source="CVE"/>
        <description>- Bump to 2.6.28 and OpenJDK 7u351-b01.
- Security fixes in 7u351:
 - CVE-2022-21540: Improve class compilation (JDK-8281859)
 - CVE-2022-21541: Enhance MethodHandle invocations (JDK-8281866)
 - CVE-2022-34169: Improve Xalan supports (JDK-8285407)
- Security fixes in 7u341:
 - CVE-2022-21426: Better XPath expression handling (JDK-8270504)
 - CVE-2022-21434: Better invocation handler handling (JDK-8277672)
 - CVE-2022-21443: Improved Object Identification (JDK-8275151)
 - CVE-2022-21476: Improve Santuario processing (JDK-8278008)
 - CVE-2022-21496: Improve URL supports (JDK-8278972)
- Security fixes in 7u331:
 - CVE-2022-21248: Enhance cross VM serialization (JDK-8264934)
 - CVE-2022-21282: Better resolution of URIs (JDK-8270492)
 - CVE-2022-21283: Better String matching (JDK-8268813)
 - CVE-2022-21293: Improve String constructions (JDK-8270392)
 - CVE-2022-21294: Enhance construction of Identity maps (JDK-8270416)
 - CVE-2022-21296: Improve SAX Parser configuration management (JDK-8270498)
 - CVE-2022-21299: Improved scanning of XML entities (JDK-8270646)
 - CVE-2022-21305: Better array indexing (JDK-8272014)
 - CVE-2022-21340: Verify Jar Verification (JDK-8272026)
 - CVE-2022-21341: Improve serial forms for transport (JDK-8272236)
 - CVE-2022-21349: Improve Solaris font rendering (JDK-8273748)
 - CVE-2022-21360: Enhance BMP image support (JDK-8273756)
 - CVE-2022-21365: Enhanced BMP processing (JDK-8273838)
- Security fixes in 7u321:
 - CVE-2021-35550: Update the default enabled cipher suites preference
   (JDK-8163326)
 - CVE-2021-35556: Richer Text Editors (JDK-8265167)
 - CVE-2021-35559: Enhanced style for RTF kit (JDK-8265580)
 - CVE-2021-35561: Better hashing support (JDK-8266097)
 - CVE-2021-35564: Improve Keystore integrity (JDK-8266137)
 - CVE-2021-35565: com.sun.net.HttpsServer spins on TLS session close
   (JDK-8254967)
 - CVE-2021-35586: Better BMP support (JDK-8267735)
 - CVE-2021-35588: InnerClasses: VM permits wrong Throw ClassFormatError if
   InnerClasses attribute's inner_class_info_index is 0 (JDK-8130183)
 - CVE-2021-35603: Better session identification (JDK-8269618)
- Security fixes in 7u311:
 - CVE-2021-2341: Improve file transfers (JDK-8258432)
 - CVE-2021-2369: Better jar file validation (JDK-8260967)
 - CVE-2021-2432: Provide better LDAP provider support (JDK-8267412)
- Security fixes in 7u301:
 - CVE-2021-2161: Less ambiguous processing (JDK-8250568)
 - CVE-2021-2163: Enhance opening JARs (JDK-8249906)
- Security fixes in 7u281:
 - CVE-2020-14779: Enhance support of Proxy class (JDK-8236862)
 - CVE-2020-14781: Enhanced LDAP contexts (JDK-8237990)
 - CVE-2020-14782: Enhance certificate processing (JDK-8237995)
 - CVE-2020-14792: Better range handling (JDK-8241114)
 - CVE-2020-14796: Improved URI Support (JDK-8242680)
 - CVE-2020-14797: Better Path Validation (JDK-8242685)
 - CVE-2020-14798: Enhanced buffer support (JDK-8242695)
 - CVE-2020-14803: Improved Buffer supports (JDK-8244136)
- Security fixes in 7u271:
 - CVE-2020-14577: Enhance certificate verification (JDK-8237592)
 - CVE-2020-14578: NegativeArraySizeException in
   sun.security.util.DerInputStream.getUnalignedBitString() (JDK-8028591)
 - CVE-2020-14579: NullPointerException in DerValue.equals(DerValue)
   (JDK-8028431)
 - CVE-2020-14581: Better matrix operations (JDK-8238002)
 - CVE-2020-14583: Better Buffer support (JDK-8238920)
 - CVE-2020-14593: Less Affine Transformations (JDK-8240119)
 - CVE-2020-14621: Better XML namespace handling (JDK-8242136)
- Update tzdata requirement to 2022a to match JDK-8283350
- Update NEWS from IcedTea
- Adjust jdk8076221-pr2809-disable_rc4_cipher_suites.patch to apply after
  bump OpenJDK version</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-22"/>
          <updated date="2022-08-22"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21365" impact="moderate" public="20220119">CVE-2022-21365</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21296" impact="moderate" public="20220119">CVE-2022-21296</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21360" impact="moderate" public="20220119">CVE-2022-21360</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21341" impact="moderate" public="20220119">CVE-2022-21341</cve>
          <cve cvss2="2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-2163" impact="moderate" public="20210422">CVE-2021-2163</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21282" impact="moderate" public="20220119">CVE-2022-21282</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21340" impact="moderate" public="20220119">CVE-2022-21340</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21305" impact="moderate" public="20220119">CVE-2022-21305</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21293" impact="moderate" public="20220119">CVE-2022-21293</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21540" impact="moderate" public="20220719">CVE-2022-21540</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21541" impact="moderate" public="20220719">CVE-2022-21541</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-681" href="https://cve.tuxcare.com/els/cve/CVE-2022-34169" impact="critical" public="20220719">CVE-2022-34169</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21283" impact="moderate" public="20220119">CVE-2022-21283</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21496" impact="moderate" public="20220419">CVE-2022-21496</cve>
          <cve cvss2="7.1/AV:N/AC:M/Au:N/C:C/I:N/A:N" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-35550" impact="moderate" public="20211020">CVE-2021-35550</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-35561" impact="moderate" public="20211020">CVE-2021-35561</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-35586" impact="moderate" public="20211020">CVE-2021-35586</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-35603" impact="low" public="20211020">CVE-2021-35603</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14797" impact="low" public="20201021">CVE-2020-14797</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2020-14578" impact="low" public="20200715">CVE-2020-14578</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14577" impact="low" public="20200715">CVE-2020-14577</cve>
          <cve cvss2="5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2020-14583" impact="important" public="20200715">CVE-2020-14583</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2020-14579" impact="low" public="20200715">CVE-2020-14579</cve>
          <cve cvss2="2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14798" impact="low" public="20201021">CVE-2020-14798</cve>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:P/I:P/A:N" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14792" impact="moderate" public="20201021">CVE-2020-14792</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2020-14779" impact="low" public="20201021">CVE-2020-14779</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-2369" impact="moderate" public="20210721">CVE-2021-2369</cve>
          <cve cvss2="2.6/AV:N/AC:H/Au:N/C:N/I:N/A:P" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-35588" impact="low" public="20211020">CVE-2021-35588</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21476" impact="important" public="20220419">CVE-2022-21476</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21294" impact="moderate" public="20220119">CVE-2022-21294</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-35556" impact="moderate" public="20211020">CVE-2021-35556</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21426" impact="moderate" public="20220419">CVE-2022-21426</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21434" impact="moderate" public="20220419">CVE-2022-21434</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-2161" impact="moderate" public="20210422">CVE-2021-2161</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14621" impact="moderate" public="20200715">CVE-2020-14621</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14593" impact="important" public="20200715">CVE-2020-14593</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14581" impact="low" public="20200715">CVE-2020-14581</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14803" impact="moderate" public="20201021">CVE-2020-14803</cve>
          <cve cvss2="2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14796" impact="low" public="20201021">CVE-2020-14796</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14782" impact="low" public="20201021">CVE-2020-14782</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2020-14781" impact="low" public="20201021">CVE-2020-14781</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-2341" impact="low" public="20210721">CVE-2021-2341</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-35565" impact="moderate" public="20211020">CVE-2021-35565</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-35564" impact="moderate" public="20211020">CVE-2021-35564</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-35559" impact="moderate" public="20211020">CVE-2021-35559</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21443" impact="low" public="20220419">CVE-2022-21443</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21299" impact="moderate" public="20220119">CVE-2022-21299</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2022-21349" impact="moderate" public="20220119">CVE-2022-21349</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-21248" impact="low" public="20220119">CVE-2022-21248</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2021-2432" impact="low" public="20210721">CVE-2021-2432</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.7.0-openjdk is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1661176564001"/>
        <criteria operator="AND">
          <criterion comment="java-1.7.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1661176564002"/>
          <criterion comment="java-1.7.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1661176564003"/>
        </criteria>
        <criterion comment="java-1.7.0-openjdk-demo is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1661176564004"/>
        <criteria operator="AND">
          <criterion comment="java-1.7.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1661176564005"/>
          <criterion comment="java-1.7.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1661176564006"/>
        </criteria>
        <criterion comment="java-1.7.0-openjdk-devel is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1661176564007"/>
        <criteria operator="AND">
          <criterion comment="java-1.7.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1661176564008"/>
          <criterion comment="java-1.7.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1661176564009"/>
        </criteria>
        <criterion comment="java-1.7.0-openjdk-javadoc is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1661176564010"/>
        <criteria operator="AND">
          <criterion comment="java-1.7.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1661176564011"/>
          <criterion comment="java-1.7.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1661176564012"/>
        </criteria>
        <criterion comment="java-1.7.0-openjdk-src is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1661176564013"/>
        <criteria operator="AND">
          <criterion comment="java-1.7.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1661176564014"/>
          <criterion comment="java-1.7.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1661176564015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1661442764" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-2845, CVE-2022-2849</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1661442764" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1661442764" source="CLSA"/>
        <reference ref_id="CVE-2022-2845" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2845" source="CVE"/>
        <reference ref_id="CVE-2022-2849" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2849" source="CVE"/>
        <description>- CVE-2022-2849: fix invalid memory access with for loop over NULL string
- CVE-2022-2845: fix reading before the start of the line</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-25"/>
          <updated date="2022-08-25"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-126" href="https://cve.tuxcare.com/els/cve/CVE-2022-2845" impact="important" public="20220817">CVE-2022-2845</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2022-2849" impact="important" public="20220817">CVE-2022-2849</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1661442764001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1661442764002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1661442764003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1661442764004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1661442764005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1661442999" version="1">
      <metadata>
        <title>Fixed CVE-2022-37434 in rsync</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1661442999" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1661442999" source="CLSA"/>
        <reference ref_id="CVE-2022-37434" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-37434" source="CVE"/>
        <description>- CVE-2022-37434: fix possible buffer overflow when getting a gzip header extra field
  with inflate()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-08-25"/>
          <updated date="2022-08-25"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-37434" impact="critical" public="20220805">CVE-2022-37434</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1661442999001"/>
        <criteria operator="AND">
          <criterion comment="rsync isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653004535002"/>
          <criterion comment="rsync isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653004535003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1662658348" version="1">
      <metadata>
        <title>Fixed CVE-2022-29154 in rsync</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1662658348" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1662658348" source="CLSA"/>
        <reference ref_id="CVE-2022-29154" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-29154" source="CVE"/>
        <description>- CVE-2022-29154: fix arbitrary file write vulnerability via malicious rsync
  server (MITM attack), refactoring
- fix test-system components, enable 'daemon' and 'hardlinks' tests</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-09-08"/>
          <updated date="2022-09-08"/>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-862" href="https://cve.tuxcare.com/els/cve/CVE-2022-29154" impact="important" public="20220802">CVE-2022-29154</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1662658348001"/>
        <criteria operator="AND">
          <criterion comment="rsync isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653004535002"/>
          <criterion comment="rsync isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653004535003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1663173256" version="1">
      <metadata>
        <title>Fixed CVE-2022-28614 in httpd</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1663173256" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1663173256" source="CLSA"/>
        <reference ref_id="CVE-2022-28614" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-28614" source="CVE"/>
        <description>- CVE-2022-28614: fix out-of-bounds read via ap_rwrite()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-09-14"/>
          <updated date="2022-09-14"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-28614" impact="moderate" public="20220609">CVE-2022-28614</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1663173256001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1663173256002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1663173256003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1663173256004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1663173256005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1663591920" version="1">
      <metadata>
        <title>Fixed CVE-2022-28614 in httpd</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1663591920" ref_url="https://cve.tuxcare.com/releases/CLSA-2022:1663591920" source="CLSA"/>
        <reference ref_id="CVE-2022-28614" ref_url="https://cve.tuxcare.com/cve/CVE-2022-28614" source="CVE"/>
        <description>- CVE-2022-28614: fix out-of-bounds read via ap_rwrite(), refactoring</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-09-19"/>
          <updated date="2022-09-19"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-190" href="https://cve.tuxcare.com/cve/CVE-2022-28614" impact="moderate" public="20220609">CVE-2022-28614</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1663591920001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1663591920002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1663591920003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1663591920004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1663591920005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1664193203" version="1">
      <metadata>
        <title>Fixed CVE-2022-40674 in expat</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1664193203" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1664193203" source="CLSA"/>
        <reference ref_id="CVE-2022-40674" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-40674" source="CVE"/>
        <description>- CVE-2022-40674: Ensure raw tagnames are safe exiting
  internalEntityParser
- fix tests leak
- fix xmlparse leak</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-09-26"/>
          <updated date="2022-09-26"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-40674" impact="critical" public="20220914">CVE-2022-40674</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1664193203001"/>
        <criteria operator="AND">
          <criterion comment="expat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248002"/>
          <criterion comment="expat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248003"/>
        </criteria>
        <criterion comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1664193203002"/>
        <criteria operator="AND">
          <criterion comment="expat-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248005"/>
          <criterion comment="expat-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1664476383" version="1">
      <metadata>
        <title>Fixed CVE-2022-3256 in vim</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1664476383" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1664476383" source="CLSA"/>
        <reference ref_id="CVE-2022-2946" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2946" source="CVE"/>
        <reference ref_id="CVE-2022-3037" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3037" source="CVE"/>
        <reference ref_id="CVE-2022-3134" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3134" source="CVE"/>
        <reference ref_id="CVE-2022-3234" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3234" source="CVE"/>
        <reference ref_id="CVE-2022-3256" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3256" source="CVE"/>
        <reference ref_id="CVE-2022-3099" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3099" source="CVE"/>
        <description>- CVE-2022-3256: copy the mark before editing another buffer</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-09-29"/>
          <updated date="2022-09-29"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-2946" impact="important" public="20220823">CVE-2022-2946</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-3037" impact="important" public="20220830">CVE-2022-3037</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-3134" impact="important" public="20220906">CVE-2022-3134</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-3234" impact="important" public="20220917">CVE-2022-3234</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-3256" impact="important" public="20220922">CVE-2022-3256</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-3099" impact="important" public="20220903">CVE-2022-3099</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1664476383001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1664476383002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1664476383003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1664476383004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1664476383005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1664476612" version="1">
      <metadata>
        <title>Fixed CVE-2022-2795 in bind</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1664476612" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1664476612" source="CLSA"/>
        <reference ref_id="CVE-2022-2795" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2795" source="CVE"/>
        <description>- CVE-2022-2795: fix possible resolver performance degradation when processing large delegations</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-09-29"/>
          <updated date="2022-09-29"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2022-2795" impact="important" public="20220921">CVE-2022-2795</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1664476612001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1664476612002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1664476612003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1664476612004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1664476612005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1664476612006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1665428177" version="1">
      <metadata>
        <title>Fixed CVEs in sqlite: CVE-2020-35525, CVE-2020-13435</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1665428177" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1665428177" source="CLSA"/>
        <reference ref_id="CVE-2020-35525" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-35525" source="CVE"/>
        <reference ref_id="CVE-2020-13435" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-13435" source="CVE"/>
        <description>- CVE-2020-13435: add a code that tries to prevent a recurrence of
  problems
- CVE-2020-35525: a potential null pointer dereference was fixed</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-10-10"/>
          <updated date="2022-10-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2020-35525" impact="important" public="20220901">CVE-2020-35525</cve>
          <cve cvss2="2.1/AV:L/AC:L/Au:N/C:N/I:N/A:P" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2020-13435" impact="moderate" public="20200524">CVE-2020-13435</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="lemon is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1665428177001"/>
        <criteria operator="AND">
          <criterion comment="lemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177002"/>
          <criterion comment="lemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177003"/>
        </criteria>
        <criterion comment="sqlite is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1665428177004"/>
        <criteria operator="AND">
          <criterion comment="sqlite isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177005"/>
          <criterion comment="sqlite isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177006"/>
        </criteria>
        <criterion comment="sqlite-devel is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1665428177007"/>
        <criteria operator="AND">
          <criterion comment="sqlite-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177008"/>
          <criterion comment="sqlite-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177009"/>
        </criteria>
        <criterion comment="sqlite-doc is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1665428177010"/>
        <criteria operator="AND">
          <criterion comment="sqlite-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177011"/>
          <criterion comment="sqlite-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177012"/>
        </criteria>
        <criterion comment="sqlite-tcl is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1665428177013"/>
        <criteria operator="AND">
          <criterion comment="sqlite-tcl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177014"/>
          <criterion comment="sqlite-tcl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1665501369" version="1">
      <metadata>
        <title>Fixed CVE-2022-41318 in squid</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1665501369" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1665501369" source="CLSA"/>
        <reference ref_id="CVE-2022-41318" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-41318" source="CVE"/>
        <description>- CVE-2022-41318: Fix buffer-over-read in SSPI and SMB authentication</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-10-11"/>
          <updated date="2022-10-11"/>
          <cve cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" cwe="CWE-126" href="https://cve.tuxcare.com/els/cve/CVE-2022-41318" impact="important" public="20220923">CVE-2022-41318</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1665501369001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1665501511" version="1">
      <metadata>
        <title>Fixed CVE-2022-41318 in squid34</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1665501511" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1665501511" source="CLSA"/>
        <reference ref_id="CVE-2022-41318" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-41318" source="CVE"/>
        <description>- CVE-2022-41318: Fix buffer-over-read in SSPI and SMB authentication</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-10-11"/>
          <updated date="2022-10-11"/>
          <cve cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" cwe="CWE-126" href="https://cve.tuxcare.com/els/cve/CVE-2022-41318" impact="important" public="20220923">CVE-2022-41318</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1665501511001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1665680212" version="1">
      <metadata>
        <title>Fixed CVEs in vim: CVE-2022-3296, CVE-2022-3324</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1665680212" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1665680212" source="CLSA"/>
        <reference ref_id="CVE-2022-3296" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3296" source="CVE"/>
        <reference ref_id="CVE-2022-3324" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3324" source="CVE"/>
        <description>- CVE-2022-3296: check CSF_TRY can be found
- CVE-2022-3324: make sure the window width does not become negative</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-10-13"/>
          <updated date="2022-10-13"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://cve.tuxcare.com/els/cve/CVE-2022-3296" impact="important" public="20220925">CVE-2022-3296</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-3324" impact="important" public="20220927">CVE-2022-3324</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1665680212001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1665680212002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1665680212003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1665680212004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1665680212005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1667493762" version="1">
      <metadata>
        <title>expat: Fix of CVE-2022-43680</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1667493762" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1667493762" source="CLSA"/>
        <reference ref_id="CVE-2022-43680" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-43680" source="CVE"/>
        <description>- CVE-2022-43680: Fix overeager DTD destruction</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-03"/>
          <updated date="2022-11-03"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-43680" impact="important" public="20221024">CVE-2022-43680</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1667493762001"/>
        <criteria operator="AND">
          <criterion comment="expat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248002"/>
          <criterion comment="expat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248003"/>
        </criteria>
        <criterion comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1667493762002"/>
        <criteria operator="AND">
          <criterion comment="expat-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248005"/>
          <criterion comment="expat-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1668120434" version="1">
      <metadata>
        <title>perl: Fix of CVE-2020-16156</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1668120434" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1668120434" source="CLSA"/>
        <reference ref_id="CVE-2020-16156" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-16156" source="CVE"/>
        <description>- CVE-2020-16156: recognize CANNOT_VERIFY signature verification type</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-10"/>
          <updated date="2022-11-10"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-347" href="https://cve.tuxcare.com/els/cve/CVE-2020-16156" impact="important" public="20211213">CVE-2020-16156</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="perl is earlier than 4:5.10.1-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434001"/>
        <criteria operator="AND">
          <criterion comment="perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005002"/>
          <criterion comment="perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005003"/>
        </criteria>
        <criterion comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434002"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Extract isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005005"/>
          <criterion comment="perl-Archive-Extract isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005006"/>
        </criteria>
        <criterion comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434003"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Tar isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005008"/>
          <criterion comment="perl-Archive-Tar isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005009"/>
        </criteria>
        <criterion comment="perl-CGI is earlier than 0:3.51-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434004"/>
        <criteria operator="AND">
          <criterion comment="perl-CGI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005011"/>
          <criterion comment="perl-CGI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005012"/>
        </criteria>
        <criterion comment="perl-CPAN is earlier than 0:1.9402-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434005"/>
        <criteria operator="AND">
          <criterion comment="perl-CPAN isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005014"/>
          <criterion comment="perl-CPAN isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005015"/>
        </criteria>
        <criterion comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434006"/>
        <criteria operator="AND">
          <criterion comment="perl-CPANPLUS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005017"/>
          <criterion comment="perl-CPANPLUS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005018"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434007"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005020"/>
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005021"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434008"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005023"/>
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005024"/>
        </criteria>
        <criterion comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434009"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005026"/>
          <criterion comment="perl-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005027"/>
        </criteria>
        <criterion comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434010"/>
        <criteria operator="AND">
          <criterion comment="perl-Digest-SHA isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005029"/>
          <criterion comment="perl-Digest-SHA isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005030"/>
        </criteria>
        <criterion comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434011"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005032"/>
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005033"/>
        </criteria>
        <criterion comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434012"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-Embed isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005035"/>
          <criterion comment="perl-ExtUtils-Embed isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005036"/>
        </criteria>
        <criterion comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434013"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005038"/>
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005039"/>
        </criteria>
        <criterion comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434014"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005041"/>
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005042"/>
        </criteria>
        <criterion comment="perl-File-Fetch is earlier than 0:0.26-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434015"/>
        <criteria operator="AND">
          <criterion comment="perl-File-Fetch isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005044"/>
          <criterion comment="perl-File-Fetch isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005045"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434016"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Base isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005047"/>
          <criterion comment="perl-IO-Compress-Base isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005048"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434017"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005050"/>
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005051"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434018"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005053"/>
          <criterion comment="perl-IO-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005054"/>
        </criteria>
        <criterion comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434019"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005056"/>
          <criterion comment="perl-IO-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005057"/>
        </criteria>
        <criterion comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434020"/>
        <criteria operator="AND">
          <criterion comment="perl-IPC-Cmd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005059"/>
          <criterion comment="perl-IPC-Cmd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005060"/>
        </criteria>
        <criterion comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434021"/>
        <criteria operator="AND">
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005062"/>
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005063"/>
        </criteria>
        <criterion comment="perl-Log-Message is earlier than 1:0.02-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434022"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005065"/>
          <criterion comment="perl-Log-Message isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005066"/>
        </criteria>
        <criterion comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434023"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005068"/>
          <criterion comment="perl-Log-Message-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005069"/>
        </criteria>
        <criterion comment="perl-Module-Build is earlier than 1:0.3500-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434024"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Build isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005071"/>
          <criterion comment="perl-Module-Build isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005072"/>
        </criteria>
        <criterion comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434025"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-CoreList isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005074"/>
          <criterion comment="perl-Module-CoreList isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005075"/>
        </criteria>
        <criterion comment="perl-Module-Load is earlier than 1:0.16-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434026"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005077"/>
          <criterion comment="perl-Module-Load isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005078"/>
        </criteria>
        <criterion comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434027"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load-Conditional isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005080"/>
          <criterion comment="perl-Module-Load-Conditional isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005081"/>
        </criteria>
        <criterion comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434028"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Loaded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005083"/>
          <criterion comment="perl-Module-Loaded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005084"/>
        </criteria>
        <criterion comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434029"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Pluggable isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005086"/>
          <criterion comment="perl-Module-Pluggable isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005087"/>
        </criteria>
        <criterion comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434030"/>
        <criteria operator="AND">
          <criterion comment="perl-Object-Accessor isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005089"/>
          <criterion comment="perl-Object-Accessor isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005090"/>
        </criteria>
        <criterion comment="perl-Package-Constants is earlier than 1:0.02-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434031"/>
        <criteria operator="AND">
          <criterion comment="perl-Package-Constants isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005092"/>
          <criterion comment="perl-Package-Constants isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005093"/>
        </criteria>
        <criterion comment="perl-Params-Check is earlier than 1:0.26-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434032"/>
        <criteria operator="AND">
          <criterion comment="perl-Params-Check isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005095"/>
          <criterion comment="perl-Params-Check isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005096"/>
        </criteria>
        <criterion comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434033"/>
        <criteria operator="AND">
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005098"/>
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005099"/>
        </criteria>
        <criterion comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434034"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Escapes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005101"/>
          <criterion comment="perl-Pod-Escapes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005102"/>
        </criteria>
        <criterion comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434035"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005104"/>
          <criterion comment="perl-Pod-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005105"/>
        </criteria>
        <criterion comment="perl-Term-UI is earlier than 0:0.20-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434036"/>
        <criteria operator="AND">
          <criterion comment="perl-Term-UI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005107"/>
          <criterion comment="perl-Term-UI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005108"/>
        </criteria>
        <criterion comment="perl-Test-Harness is earlier than 0:3.17-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434037"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Harness isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005110"/>
          <criterion comment="perl-Test-Harness isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005111"/>
        </criteria>
        <criterion comment="perl-Test-Simple is earlier than 0:0.92-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434038"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005113"/>
          <criterion comment="perl-Test-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005114"/>
        </criteria>
        <criterion comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434039"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-HiRes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005116"/>
          <criterion comment="perl-Time-HiRes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005117"/>
        </criteria>
        <criterion comment="perl-Time-Piece is earlier than 0:1.15-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434040"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-Piece isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005119"/>
          <criterion comment="perl-Time-Piece isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005120"/>
        </criteria>
        <criterion comment="perl-core is earlier than 0:5.10.1-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434041"/>
        <criteria operator="AND">
          <criterion comment="perl-core isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005122"/>
          <criterion comment="perl-core isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005123"/>
        </criteria>
        <criterion comment="perl-devel is earlier than 4:5.10.1-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434042"/>
        <criteria operator="AND">
          <criterion comment="perl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005125"/>
          <criterion comment="perl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005126"/>
        </criteria>
        <criterion comment="perl-libs is earlier than 4:5.10.1-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434043"/>
        <criteria operator="AND">
          <criterion comment="perl-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005128"/>
          <criterion comment="perl-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005129"/>
        </criteria>
        <criterion comment="perl-parent is earlier than 1:0.221-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434044"/>
        <criteria operator="AND">
          <criterion comment="perl-parent isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005131"/>
          <criterion comment="perl-parent isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005132"/>
        </criteria>
        <criterion comment="perl-suidperl is earlier than 4:5.10.1-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434045"/>
        <criteria operator="AND">
          <criterion comment="perl-suidperl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005134"/>
          <criterion comment="perl-suidperl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005135"/>
        </criteria>
        <criterion comment="perl-version is earlier than 3:0.77-146.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1668120434046"/>
        <criteria operator="AND">
          <criterion comment="perl-version isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005137"/>
          <criterion comment="perl-version isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005138"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1668121215" version="1">
      <metadata>
        <title>sqlite: Fix of CVE-2022-35737</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1668121215" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1668121215" source="CLSA"/>
        <reference ref_id="CVE-2022-35737" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-35737" source="CVE"/>
        <description>- CVE-2022-35737: fix a buffer overflow</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-10"/>
          <updated date="2022-11-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2022-35737" impact="important" public="20220803">CVE-2022-35737</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="lemon is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1668121215001"/>
        <criteria operator="AND">
          <criterion comment="lemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177002"/>
          <criterion comment="lemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177003"/>
        </criteria>
        <criterion comment="sqlite is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1668121215002"/>
        <criteria operator="AND">
          <criterion comment="sqlite isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177005"/>
          <criterion comment="sqlite isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177006"/>
        </criteria>
        <criterion comment="sqlite-devel is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1668121215003"/>
        <criteria operator="AND">
          <criterion comment="sqlite-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177008"/>
          <criterion comment="sqlite-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177009"/>
        </criteria>
        <criterion comment="sqlite-doc is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1668121215004"/>
        <criteria operator="AND">
          <criterion comment="sqlite-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177011"/>
          <criterion comment="sqlite-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177012"/>
        </criteria>
        <criterion comment="sqlite-tcl is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1668121215005"/>
        <criteria operator="AND">
          <criterion comment="sqlite-tcl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177014"/>
          <criterion comment="sqlite-tcl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1669066613" version="1">
      <metadata>
        <title>nginx: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1669066613" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1669066613" source="CLSA"/>
        <reference ref_id="CVE-2022-41741" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-41741" source="CVE"/>
        <reference ref_id="CVE-2022-41742" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-41742" source="CVE"/>
        <description>- CVE-2022-41741: fix memory corruption in the ngx_http_mp4_module
- CVE-2022-41742: fix memory disclosure in the ngx_http_mp4_module</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-21"/>
          <updated date="2022-11-21"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-41741" impact="important" public="20221019">CVE-2022-41741</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-41742" impact="important" public="20221019">CVE-2022-41742</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nginx is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613001"/>
        <criteria operator="AND">
          <criterion comment="nginx isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762002"/>
          <criterion comment="nginx isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762003"/>
        </criteria>
        <criterion comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613002"/>
        <criteria operator="AND">
          <criterion comment="nginx-all-modules isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762005"/>
          <criterion comment="nginx-all-modules isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762006"/>
        </criteria>
        <criterion comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613003"/>
        <criteria operator="AND">
          <criterion comment="nginx-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762008"/>
          <criterion comment="nginx-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762009"/>
        </criteria>
        <criterion comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613004"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-geoip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762011"/>
          <criterion comment="nginx-mod-http-geoip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762012"/>
        </criteria>
        <criterion comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613005"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-image-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762014"/>
          <criterion comment="nginx-mod-http-image-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762015"/>
        </criteria>
        <criterion comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613006"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762017"/>
          <criterion comment="nginx-mod-http-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762018"/>
        </criteria>
        <criterion comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613007"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762020"/>
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762021"/>
        </criteria>
        <criterion comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613008"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-mail isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762023"/>
          <criterion comment="nginx-mod-mail isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762024"/>
        </criteria>
        <criterion comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1669066613009"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-stream isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762026"/>
          <criterion comment="nginx-mod-stream isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1669236294" version="1">
      <metadata>
        <title>xterm: Fix of CVE-2022-45063</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1669236294" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1669236294" source="CLSA"/>
        <reference ref_id="CVE-2022-45063" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45063" source="CVE"/>
        <description>- CVE-2022-45063: improve error recovery when setting a bitmap font for the VT100 window
- Add NULL pointer checks in x_strcasecmp() and x_strncasecmp() to help with error
  recovery for a missing font</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-23"/>
          <updated date="2022-11-23"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-77" href="https://cve.tuxcare.com/els/cve/CVE-2022-45063" impact="critical" public="20221110">CVE-2022-45063</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="xterm is earlier than 0:253-2.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1669236294001"/>
        <criteria operator="AND">
          <criterion comment="xterm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575983002"/>
          <criterion comment="xterm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575983003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1669236630" version="1">
      <metadata>
        <title>python: Fix of CVE-2022-45061</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1669236630" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1669236630" source="CLSA"/>
        <reference ref_id="CVE-2022-45061" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45061" source="CVE"/>
        <description>- CVE-2022-45061: Fix quadratic time idna decoding
- fix tests to be compatible with expat 2.0.1-tuxcare.els</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-23"/>
          <updated date="2022-11-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2022-45061" impact="important" public="20221109">CVE-2022-45061</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1669236630001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1669236630002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1669236630003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1669236630004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1669236630005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1669236630006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1669236934" version="1">
      <metadata>
        <title>vim: Fix of CVE-2022-3352</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1669236934" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1669236934" source="CLSA"/>
        <reference ref_id="CVE-2022-3352" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3352" source="CVE"/>
        <description>- CVE-2022-3352: disallow deleting the current buffer to avoid using freed memory</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-11-23"/>
          <updated date="2022-11-23"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-3352" impact="important" public="20220929">CVE-2022-3352</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" test_ref="oval:com.tuxcare.clsa:tst:1669236934001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" test_ref="oval:com.tuxcare.clsa:tst:1669236934002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" test_ref="oval:com.tuxcare.clsa:tst:1669236934003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" test_ref="oval:com.tuxcare.clsa:tst:1669236934004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" test_ref="oval:com.tuxcare.clsa:tst:1669236934005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1670521677" version="1">
      <metadata>
        <title>libxml2: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1670521677" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1670521677" source="CLSA"/>
        <reference ref_id="CVE-2022-40304" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-40304" source="CVE"/>
        <reference ref_id="CVE-2022-40303" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-40303" source="CVE"/>
        <description>- CVE-2022-40303: fix integer overflows with XML_PARSE_HUGE
- CVE-2022-40304: fix dict corruption caused by entity reference cycles</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-08"/>
          <updated date="2022-12-08"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-611" href="https://cve.tuxcare.com/els/cve/CVE-2022-40304" impact="important" public="20221123">CVE-2022-40304</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-40303" impact="important" public="20221123">CVE-2022-40303</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1670521677001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1670521677002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1670521677003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1670521677004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1670874451" version="1">
      <metadata>
        <title>krb5: Fix of CVE-2022-42898</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1670874451" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1670874451" source="CLSA"/>
        <reference ref_id="CVE-2022-42898" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-42898" source="CVE"/>
        <description>- CVE-2022-42898: Fix integer overflows in PAC parsing
- A test-suite was activated</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-12"/>
          <updated date="2022-12-12"/>
          <cve cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-42898" impact="moderate" public="20221115">CVE-2022-42898</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="krb5-devel is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451001"/>
        <criteria operator="AND">
          <criterion comment="krb5-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451002"/>
          <criterion comment="krb5-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451003"/>
        </criteria>
        <criterion comment="krb5-libs is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451004"/>
        <criteria operator="AND">
          <criterion comment="krb5-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451005"/>
          <criterion comment="krb5-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451006"/>
        </criteria>
        <criterion comment="krb5-pkinit-openssl is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451007"/>
        <criteria operator="AND">
          <criterion comment="krb5-pkinit-openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451008"/>
          <criterion comment="krb5-pkinit-openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451009"/>
        </criteria>
        <criterion comment="krb5-server is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451010"/>
        <criteria operator="AND">
          <criterion comment="krb5-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451011"/>
          <criterion comment="krb5-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451012"/>
        </criteria>
        <criterion comment="krb5-server-ldap is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451013"/>
        <criteria operator="AND">
          <criterion comment="krb5-server-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451014"/>
          <criterion comment="krb5-server-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451015"/>
        </criteria>
        <criterion comment="krb5-workstation is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451016"/>
        <criteria operator="AND">
          <criterion comment="krb5-workstation isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451017"/>
          <criterion comment="krb5-workstation isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451018"/>
        </criteria>
        <criterion comment="libkadm5 is earlier than 0:1.10.3-65.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1670874451019"/>
        <criteria operator="AND">
          <criterion comment="libkadm5 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1670874451020"/>
          <criterion comment="libkadm5 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1670874451021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1670874574" version="1">
      <metadata>
        <title>vim: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1670874574" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1670874574" source="CLSA"/>
        <reference ref_id="CVE-2022-3520" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3520" source="CVE"/>
        <reference ref_id="CVE-2022-4141" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-4141" source="CVE"/>
        <description>- CVE-2022-4141: check for text locked in CTRL-W gf
- CVE-2022-3520: check that the column does not become negative</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-12"/>
          <updated date="2022-12-12"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-3520" impact="critical" public="20221202">CVE-2022-3520</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-4141" impact="important" public="20221125">CVE-2022-4141</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" test_ref="oval:com.tuxcare.clsa:tst:1670874574001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" test_ref="oval:com.tuxcare.clsa:tst:1670874574002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" test_ref="oval:com.tuxcare.clsa:tst:1670874574003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" test_ref="oval:com.tuxcare.clsa:tst:1670874574004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" test_ref="oval:com.tuxcare.clsa:tst:1670874574005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1671033543" version="1">
      <metadata>
        <title>vim: Fix of CVE-2022-4292</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1671033543" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1671033543" source="CLSA"/>
        <reference ref_id="CVE-2022-4292" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-4292" source="CVE"/>
        <description>- CVE-2022-4292: bail out if the window no longer exists</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-14"/>
          <updated date="2022-12-14"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-4292" impact="important" public="20221205">CVE-2022-4292</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" test_ref="oval:com.tuxcare.clsa:tst:1671033543001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" test_ref="oval:com.tuxcare.clsa:tst:1671033543002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" test_ref="oval:com.tuxcare.clsa:tst:1671033543003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" test_ref="oval:com.tuxcare.clsa:tst:1671033543004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" test_ref="oval:com.tuxcare.clsa:tst:1671033543005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1671126165" version="1">
      <metadata>
        <title>curl: Fix of CVE-2022-32221</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1671126165" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1671126165" source="CLSA"/>
        <reference ref_id="CVE-2022-32221" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-32221" source="CVE"/>
        <description>- CVE-2022-32221: fix issue when POST following PUT confusion</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-15"/>
          <updated date="2022-12-15"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-668" href="https://cve.tuxcare.com/els/cve/CVE-2022-32221" impact="critical" public="20221205">CVE-2022-32221</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1671126165001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1671126165002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1671126165003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1671126265" version="1">
      <metadata>
        <title>vim: Fix of CVE-2022-3591</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1671126265" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1671126265" source="CLSA"/>
        <reference ref_id="CVE-2022-3591" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3591" source="CVE"/>
        <description>- CVE-2022-3591: disallow navigating to a dummy buffer</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-15"/>
          <updated date="2022-12-15"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-3591" impact="important" public="20221202">CVE-2022-3591</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" test_ref="oval:com.tuxcare.clsa:tst:1671126265001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" test_ref="oval:com.tuxcare.clsa:tst:1671126265002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" test_ref="oval:com.tuxcare.clsa:tst:1671126265003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" test_ref="oval:com.tuxcare.clsa:tst:1671126265004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" test_ref="oval:com.tuxcare.clsa:tst:1671126265005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1671481339" version="1">
      <metadata>
        <title>openssh: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2022:1671481339" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2022:1671481339" source="CLSA"/>
        <reference ref_id="CVE-2019-6109" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-6109" source="CVE"/>
        <description>- CVE-2019-6109: verify character encoding in progress display to avoid
  spoofing of scp client output
- CVE-2016-10012: updated to fix server-side protocol errors observed
  during rekeying with compression enabled</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2022-12-19"/>
          <updated date="2022-12-19"/>
          <cve cvss2="4.0/AV:N/AC:H/Au:N/C:P/I:P/A:N" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-116" href="https://cve.tuxcare.com/els/cve/CVE-2019-6109" impact="moderate" public="20190131">CVE-2019-6109</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1671481339001"/>
        <criteria operator="AND">
          <criterion comment="openssh isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023002"/>
          <criterion comment="openssh isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023003"/>
        </criteria>
        <criterion comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1671481339002"/>
        <criteria operator="AND">
          <criterion comment="openssh-askpass isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023005"/>
          <criterion comment="openssh-askpass isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023006"/>
        </criteria>
        <criterion comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1671481339003"/>
        <criteria operator="AND">
          <criterion comment="openssh-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023008"/>
          <criterion comment="openssh-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023009"/>
        </criteria>
        <criterion comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1671481339004"/>
        <criteria operator="AND">
          <criterion comment="openssh-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023011"/>
          <criterion comment="openssh-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023012"/>
        </criteria>
        <criterion comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1671481339005"/>
        <criteria operator="AND">
          <criterion comment="openssh-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023014"/>
          <criterion comment="openssh-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023015"/>
        </criteria>
        <criterion comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1671481339006"/>
        <criteria operator="AND">
          <criterion comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023017"/>
          <criterion comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1674813830" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-0049</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1674813830" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1674813830" source="CLSA"/>
        <reference ref_id="CVE-2023-0049" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0049" source="CVE"/>
        <description>- CVE-2023-0049: fix out-of-bounds read</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-01-27"/>
          <updated date="2023-01-27"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-0049" impact="important" public="20230104">CVE-2023-0049</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" test_ref="oval:com.tuxcare.clsa:tst:1674813830001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" test_ref="oval:com.tuxcare.clsa:tst:1674813830002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" test_ref="oval:com.tuxcare.clsa:tst:1674813830003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" test_ref="oval:com.tuxcare.clsa:tst:1674813830004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" test_ref="oval:com.tuxcare.clsa:tst:1674813830005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1675111939" version="1">
      <metadata>
        <title>httpd: Fix of CVE-2022-36760</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1675111939" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1675111939" source="CLSA"/>
        <reference ref_id="CVE-2022-36760" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-36760" source="CVE"/>
        <description>- CVE-2022-36760: mod_proxy_ajp: fix possible HTTP request smuggling</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-01-30"/>
          <updated date="2023-01-30"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-444" href="https://cve.tuxcare.com/els/cve/CVE-2022-36760" impact="critical" public="20230117">CVE-2022-36760</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1675111939001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1675111939002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1675111939003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1675111939004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1675111939005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1675373662" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-0433</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1675373662" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1675373662" source="CLSA"/>
        <reference ref_id="CVE-2023-0433" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0433" source="CVE"/>
        <description>- CVE-2023-0433: check for not going over the end of the line</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-02-02"/>
          <updated date="2023-02-02"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2023-0433" impact="important" public="20230121">CVE-2023-0433</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" test_ref="oval:com.tuxcare.clsa:tst:1675373662001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" test_ref="oval:com.tuxcare.clsa:tst:1675373662002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" test_ref="oval:com.tuxcare.clsa:tst:1675373662003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" test_ref="oval:com.tuxcare.clsa:tst:1675373662004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" test_ref="oval:com.tuxcare.clsa:tst:1675373662005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1675985571" version="1">
      <metadata>
        <title>sudo: Fix of CVE-2023-22809</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1675985571" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1675985571" source="CLSA"/>
        <reference ref_id="CVE-2023-22809" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-22809" source="CVE"/>
        <description>- CVE-2023-22809: do not permit editor arguments to include "--" for sudoedit
 - build tests have been enabled</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-02-09"/>
          <updated date="2023-02-09"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-269" href="https://cve.tuxcare.com/els/cve/CVE-2023-22809" impact="important" public="20230118">CVE-2023-22809</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="sudo is earlier than 0:1.8.6p3-32.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985571001"/>
        <criteria operator="AND">
          <criterion comment="sudo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864003"/>
          <criterion comment="sudo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864004"/>
        </criteria>
        <criterion comment="sudo-devel is earlier than 0:1.8.6p3-32.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985571002"/>
        <criteria operator="AND">
          <criterion comment="sudo-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864006"/>
          <criterion comment="sudo-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864007"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1675985852" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1675985852" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1675985852" source="CLSA"/>
        <reference ref_id="CVE-2023-21843" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21843" source="CVE"/>
        <reference ref_id="CVE-2023-21830" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21830" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u362-b09. That fixes following CVEs:
- CVE-2023-21830: Improper restrictions in CORBA deserialization (Serialization, 8285021)
- CVE-2023-21843: Soundbank URL remote loading (Sound, 8293742)
- Update tzdata requirement to 2022g to match JDK-8297804
- Remove patches which are in upstream now
- Remove the obsolete rh1163501 patch</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-02-09"/>
          <updated date="2023-02-09"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21843" impact="low" public="20230118">CVE-2023-21843</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21830" impact="moderate" public="20230118">CVE-2023-21830</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1675985852012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1676025596" version="1">
      <metadata>
        <title>openssl: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1676025596" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1676025596" source="CLSA"/>
        <reference ref_id="CVE-2023-0215" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0215" source="CVE"/>
        <reference ref_id="CVE-2023-0286" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0286" source="CVE"/>
        <description>- CVE-2023-0215: Fix a UAF resulting from a bug in BIO_new_NDEF
- CVE-2023-0286: Fix GENERAL_NAME_cmp for x400Address</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-02-10"/>
          <updated date="2023-02-10"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-0215" impact="moderate" public="20230207">CVE-2023-0215</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-704" href="https://cve.tuxcare.com/els/cve/CVE-2023-0286" impact="important" public="20230207">CVE-2023-0286</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1676025596001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1676025596002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1676025596003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1676025596004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1677231280" version="1">
      <metadata>
        <title>git: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1677231280" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1677231280" source="CLSA"/>
        <reference ref_id="CVE-2023-23946" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-23946" source="CVE"/>
        <reference ref_id="CVE-2021-40330" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-40330" source="CVE"/>
        <reference ref_id="CVE-2022-39260" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-39260" source="CVE"/>
        <reference ref_id="CVE-2022-41903" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-41903" source="CVE"/>
        <description>- CVE-2022-41903: fix out-of-bounds write caused by integer overflow
- CVE-2021-40330: forbid newlines in host and path
- CVE-2022-39260: reject too long command line strings
- CVE-2023-23946: prevent git-apply from writing behind newly created symbolic links</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-02-24"/>
          <updated date="2023-02-24"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-22" href="https://cve.tuxcare.com/els/cve/CVE-2023-23946" impact="important" public="20230214">CVE-2023-23946</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2021-40330" impact="important" public="20210831">CVE-2021-40330</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-39260" impact="important" public="20221019">CVE-2022-39260</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-41903" impact="critical" public="20230117">CVE-2022-41903</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280004"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280007"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280010"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280013"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280016"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280019"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280022"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280025"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280028"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280031"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677231280034"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1677791921" version="1">
      <metadata>
        <title>tar: Fix of CVE-2022-48303</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1677791921" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1677791921" source="CLSA"/>
        <reference ref_id="CVE-2022-48303" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48303" source="CVE"/>
        <description>- CVE-2022-48303: check for the end of field after leading byte (0x80 or 0xff)
  of base-256 encoded header value</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-03-02"/>
          <updated date="2023-03-02"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-48303" impact="important" public="20230130">CVE-2022-48303</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="tar is earlier than 2:1.23-15.el6_8.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1677791921001"/>
        <criteria operator="AND">
          <criterion comment="tar isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677791921002"/>
          <criterion comment="tar isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677791921003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1678136793" version="1">
      <metadata>
        <title>httpd: Fix of CVE-2006-20001</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1678136793" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1678136793" source="CLSA"/>
        <reference ref_id="CVE-2006-20001" ref_url="https://cve.tuxcare.com/els/cve/CVE-2006-20001" source="CVE"/>
        <description>- CVE-2006-20001: mod_dav: out-of-bounds read/write</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-03-06"/>
          <updated date="2023-03-06"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2006-20001" impact="important" public="20230117">CVE-2006-20001</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136793001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136793002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136793003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136793004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136793005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1678136944" version="1">
      <metadata>
        <title>python: Fix of CVE-2023-24329</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1678136944" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1678136944" source="CLSA"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-24329" source="CVE"/>
        <description>- CVE-2023-24329: Prevent urllib.parse.urlparse from accepting schemes that
  don't begin with an alphabetical ASCII character</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-03-06"/>
          <updated date="2023-03-06"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136944001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136944002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136944003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136944004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136944005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1678136944006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1678395661" version="1">
      <metadata>
        <title>php: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1678395661" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1678395661" source="CLSA"/>
        <reference ref_id="CVE-2023-0568" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0568" source="CVE"/>
        <reference ref_id="CVE-2023-0567" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0567" source="CVE"/>
        <reference ref_id="CVE-2023-0662" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0662" source="CVE"/>
        <description>- CVE-2023-0567: crypt: Fix validation of malformed BCrypt hashes
- CVE-2023-0568: Fix array overrun when appending slash to paths
- CVE-2023-0662: Fix DoS vulnerability when parsing multipart request body</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-03-09"/>
          <updated date="2023-03-09"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2023-0568" impact="important" public="20230216">CVE-2023-0568</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-328" href="https://cve.tuxcare.com/els/cve/CVE-2023-0567" impact="moderate" public="20230215">CVE-2023-0567</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2023-0662" impact="important" public="20230216">CVE-2023-0662</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1678395661027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1678820960" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-1175</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1678820960" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1678820960" source="CLSA"/>
        <reference ref_id="CVE-2023-1175" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1175" source="CVE"/>
        <description>- CVE-2023-1175: make sure "startspaces" is not negative</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-03-14"/>
          <updated date="2023-03-14"/>
          <cve cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-131" href="https://cve.tuxcare.com/els/cve/CVE-2023-1175" impact="important" public="20230304">CVE-2023-1175</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" test_ref="oval:com.tuxcare.clsa:tst:1678820960001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" test_ref="oval:com.tuxcare.clsa:tst:1678820960002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" test_ref="oval:com.tuxcare.clsa:tst:1678820960003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" test_ref="oval:com.tuxcare.clsa:tst:1678820960004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" test_ref="oval:com.tuxcare.clsa:tst:1678820960005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1679924984" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-1170</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1679924984" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1679924984" source="CLSA"/>
        <reference ref_id="CVE-2023-1170" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1170" source="CVE"/>
        <description>- CVE-2023-1170: adjust the cursor column if needed</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-03-27"/>
          <updated date="2023-03-27"/>
          <cve cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2023-1170" impact="moderate" public="20230303">CVE-2023-1170</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" test_ref="oval:com.tuxcare.clsa:tst:1679924984001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" test_ref="oval:com.tuxcare.clsa:tst:1679924984002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" test_ref="oval:com.tuxcare.clsa:tst:1679924984003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" test_ref="oval:com.tuxcare.clsa:tst:1679924984004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" test_ref="oval:com.tuxcare.clsa:tst:1679924984005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1681327540" version="1">
      <metadata>
        <title>nss: Fix of CVE-2023-0767</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1681327540" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1681327540" source="CLSA"/>
        <reference ref_id="CVE-2023-0767" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0767" source="CVE"/>
        <description>- CVE-2023-0767: nss: improve handling of unknown PKCS#12 safe bag types</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-04-12"/>
          <updated date="2023-04-12"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2023-0767" impact="important" public="20230214">CVE-2023-0767</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nss is earlier than 0:3.44.0-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1681327540001"/>
        <criteria operator="AND">
          <criterion comment="nss isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354002"/>
          <criterion comment="nss isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354003"/>
        </criteria>
        <criterion comment="nss-devel is earlier than 0:3.44.0-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1681327540002"/>
        <criteria operator="AND">
          <criterion comment="nss-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354005"/>
          <criterion comment="nss-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354006"/>
        </criteria>
        <criterion comment="nss-pkcs11-devel is earlier than 0:3.44.0-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1681327540003"/>
        <criteria operator="AND">
          <criterion comment="nss-pkcs11-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354008"/>
          <criterion comment="nss-pkcs11-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354009"/>
        </criteria>
        <criterion comment="nss-sysinit is earlier than 0:3.44.0-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1681327540004"/>
        <criteria operator="AND">
          <criterion comment="nss-sysinit isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354011"/>
          <criterion comment="nss-sysinit isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354012"/>
        </criteria>
        <criterion comment="nss-tools is earlier than 0:3.44.0-12.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1681327540005"/>
        <criteria operator="AND">
          <criterion comment="nss-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354014"/>
          <criterion comment="nss-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1681490707" version="1">
      <metadata>
        <title>curl: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1681490707" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1681490707" source="CLSA"/>
        <reference ref_id="CVE-2023-27536" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-27536" source="CVE"/>
        <reference ref_id="CVE-2023-27535" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-27535" source="CVE"/>
        <reference ref_id="CVE-2023-27533" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-27533" source="CVE"/>
        <description>- CVE-2023-27533: prevent TELNET option from IAC injection
- CVE-2023-27535: fix behavior when FTP too eager connection reuse
- CVE-2023-27536: do not reuse connections with different GSS delegations</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-04-14"/>
          <updated date="2023-04-14"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-287" href="https://cve.tuxcare.com/els/cve/CVE-2023-27536" impact="critical" public="20230330">CVE-2023-27536</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-287" href="https://cve.tuxcare.com/els/cve/CVE-2023-27535" impact="important" public="20230330">CVE-2023-27535</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-74" href="https://cve.tuxcare.com/els/cve/CVE-2023-27533" impact="important" public="20230330">CVE-2023-27533</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1681490707001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1681490707002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1681490707003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1682347721" version="1">
      <metadata>
        <title>curl: Fix of CVE-2023-27534</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1682347721" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1682347721" source="CLSA"/>
        <reference ref_id="CVE-2023-27534" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-27534" source="CVE"/>
        <description>- CVE-2023-27534: fix SFTP path '~' resolving discrepancy
- fix resolving SCP relative path</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-04-24"/>
          <updated date="2023-04-24"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els/cve/CVE-2023-27534" impact="important" public="20230330">CVE-2023-27534</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1682347721001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1682347721002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1682347721003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1682705952" version="1">
      <metadata>
        <title>kernel: Fix of 7 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1682705952" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1682705952" source="CLSA"/>
        <reference ref_id="CVE-2022-1353" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1353" source="CVE"/>
        <reference ref_id="CVE-2022-3565" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3565" source="CVE"/>
        <reference ref_id="CVE-2022-1652" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1652" source="CVE"/>
        <reference ref_id="CVE-2023-1989" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1989" source="CVE"/>
        <reference ref_id="CVE-2022-4378" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-4378" source="CVE"/>
        <reference ref_id="CVE-2023-1118" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1118" source="CVE"/>
        <reference ref_id="CVE-2022-43750" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-43750" source="CVE"/>
        <description>- mISDN: fix use-after-free bugs in l1oip timer handlers {CVE-2022-3565}
 - media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() {CVE-2023-1118}
 - Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work {CVE-2023-1989}
 - proc: proc_skip_spaces() shouldn't think it is working on C strings {CVE-2022-4378}
 - proc: avoid integer type confusion in get_proc_long {CVE-2022-4378}
 - floppy: use a statically allocated error counter {CVE-2022-1652}
 - af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register {CVE-2022-1353}
 - usb: mon: make mmapped memory read only {CVE-2022-43750}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-04-28"/>
          <updated date="2023-04-28"/>
          <cve cvss2="3.6/AV:L/AC:L/Au:N/C:P/I:N/A:P" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-1353" impact="important" public="20220429">CVE-2022-1353</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2022-3565" impact="important" public="20221017">CVE-2022-3565</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1652" impact="important" public="20220602">CVE-2022-1652</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-1989" impact="important" public="20230411">CVE-2023-1989</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-4378" impact="important" public="20230105">CVE-2022-4378</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-1118" impact="important" public="20230302">CVE-2023-1118</cve>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-43750" impact="moderate" public="20221026">CVE-2022-43750</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1682705952001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1682705952008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1683236532" version="1">
      <metadata>
        <title>openssl: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1683236532" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1683236532" source="CLSA"/>
        <reference ref_id="CVE-2023-0466" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0466" source="CVE"/>
        <reference ref_id="CVE-2023-0464" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-0464" source="CVE"/>
        <reference ref_id="CVE-2022-3996" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3996" source="CVE"/>
        <description>- CVE-2023-0464: Fix excessive resource use verifying X.509 policy constraints
- CVE-2023-0466: Fix documentation of X509_VERIFY_PARAM_add0_policy()
- CVE-2022-3996: Drop redundant flag setting in policy_cache_set_mapping()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-05-04"/>
          <updated date="2023-05-04"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-295" href="https://cve.tuxcare.com/els/cve/CVE-2023-0466" impact="moderate" public="20230328">CVE-2023-0466</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-295" href="https://cve.tuxcare.com/els/cve/CVE-2023-0464" impact="important" public="20230322">CVE-2023-0464</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-667" href="https://cve.tuxcare.com/els/cve/CVE-2022-3996" impact="important" public="20221213">CVE-2022-3996</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1683236532001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1683236532002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1683236532003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1683236532004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1683814164" version="1">
      <metadata>
        <title>git: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1683814164" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1683814164" source="CLSA"/>
        <reference ref_id="CVE-2023-25652" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-25652" source="CVE"/>
        <reference ref_id="CVE-2023-29007" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-29007" source="CVE"/>
        <description>- CVE-2023-25652: removing a link instead of writing into
- CVE-2023-29007: restrict the config file line length to parse it whole
- tests were activated
- a buffer overflow during reading of configuration's enormous value has been fixed</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-05-11"/>
          <updated date="2023-05-11"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-25652" impact="important" public="20230425">CVE-2023-25652</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-74" href="https://cve.tuxcare.com/els/cve/CVE-2023-29007" impact="important" public="20230425">CVE-2023-29007</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164002"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164003"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164004"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164005"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164006"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164007"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164008"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164009"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164010"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164011"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1683814164012"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1685377120" version="1">
      <metadata>
        <title>sysstat: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1685377120" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1685377120" source="CLSA"/>
        <reference ref_id="CVE-2022-39377" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-39377" source="CVE"/>
        <reference ref_id="CVE-2023-33204" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-33204" source="CVE"/>
        <description>- CVE-2022-39377: fix possible buffer overflow
- CVE-2023-33204: fix possible buffer overflow in an incomplete fix for
  CVE-2022-39377</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-05-29"/>
          <updated date="2023-05-29"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2022-39377" impact="important" public="20221108">CVE-2022-39377</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2023-33204" impact="important" public="20230518">CVE-2023-33204</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="sysstat is earlier than 0:9.0.4-33.el6_9.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1685377120001"/>
        <criteria operator="AND">
          <criterion comment="sysstat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1685377120002"/>
          <criterion comment="sysstat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1685377120003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1685377319" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-2610</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1685377319" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1685377319" source="CLSA"/>
        <reference ref_id="CVE-2023-2610" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-2610" source="CVE"/>
        <description>- CVE-2023-2610: limit the text length to MAXCOL</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-05-29"/>
          <updated date="2023-05-29"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2023-2610" impact="important" public="20230509">CVE-2023-2610</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" test_ref="oval:com.tuxcare.clsa:tst:1685377319001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" test_ref="oval:com.tuxcare.clsa:tst:1685377319002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" test_ref="oval:com.tuxcare.clsa:tst:1685377319003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" test_ref="oval:com.tuxcare.clsa:tst:1685377319004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" test_ref="oval:com.tuxcare.clsa:tst:1685377319005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1685634253" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-2609</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1685634253" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1685634253" source="CLSA"/>
        <reference ref_id="CVE-2023-2609" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-2609" source="CVE"/>
        <description>- CVE-2023-2609: check "y_array" is not NULL</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-06-01"/>
          <updated date="2023-06-01"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-2609" impact="important" public="20230509">CVE-2023-2609</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" test_ref="oval:com.tuxcare.clsa:tst:1685634253001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" test_ref="oval:com.tuxcare.clsa:tst:1685634253002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" test_ref="oval:com.tuxcare.clsa:tst:1685634253003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" test_ref="oval:com.tuxcare.clsa:tst:1685634253004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" test_ref="oval:com.tuxcare.clsa:tst:1685634253005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1687268961" version="1">
      <metadata>
        <title>openssl: Fix of CVE-2023-2650</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1687268961" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1687268961" source="CLSA"/>
        <reference ref_id="CVE-2023-2650" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-2650" source="CVE"/>
        <description>- CVE-2023-2650: Restrict the size of OBJECT IDENTIFIERs that OBJ_obj2txt will
  translate
- Update expired smime/SM2 certificates that affect tests.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-06-20"/>
          <updated date="2023-06-20"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2023-2650" impact="important" public="20230530">CVE-2023-2650</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1687268961001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1687268961002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1687268961003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1687268961004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1687794906" version="1">
      <metadata>
        <title>exim: Fix of CVE-2021-38371</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1687794906" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1687794906" source="CLSA"/>
        <reference ref_id="CVE-2021-38371" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-38371" source="CVE"/>
        <description>- CVE-2021-38371: Enforce STARTTLS sync point, client side
  in src/transports/smtp.c</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-06-26"/>
          <updated date="2023-06-26"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:P/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-74" href="https://cve.tuxcare.com/els/cve/CVE-2021-38371" impact="important" public="20210810">CVE-2021-38371</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1687794906001"/>
        <criteria operator="AND">
          <criterion comment="exim isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670002"/>
          <criterion comment="exim isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670003"/>
        </criteria>
        <criterion comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1687794906002"/>
        <criteria operator="AND">
          <criterion comment="exim-greylist isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670005"/>
          <criterion comment="exim-greylist isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670006"/>
        </criteria>
        <criterion comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1687794906003"/>
        <criteria operator="AND">
          <criterion comment="exim-mon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670008"/>
          <criterion comment="exim-mon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670009"/>
        </criteria>
        <criterion comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1687794906004"/>
        <criteria operator="AND">
          <criterion comment="exim-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670011"/>
          <criterion comment="exim-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670012"/>
        </criteria>
        <criterion comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1687794906005"/>
        <criteria operator="AND">
          <criterion comment="exim-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670014"/>
          <criterion comment="exim-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1688679628" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 7 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1688679628" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1688679628" source="CLSA"/>
        <reference ref_id="CVE-2023-21968" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21968" source="CVE"/>
        <reference ref_id="CVE-2023-21930" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21930" source="CVE"/>
        <reference ref_id="CVE-2023-21937" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21937" source="CVE"/>
        <reference ref_id="CVE-2023-21938" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21938" source="CVE"/>
        <reference ref_id="CVE-2023-21939" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21939" source="CVE"/>
        <reference ref_id="CVE-2023-21967" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21967" source="CVE"/>
        <reference ref_id="CVE-2023-21954" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-21954" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u372-b07. That fixes following CVEs:
- CVE-2023-21930: Improper connection handling during TLS handshake (8294474)
- CVE-2023-21937: Missing string checks for NULL characters (8296622)
- CVE-2023-21938: Incorrect handling of NULL characters in ProcessBuilder (8295304)
- CVE-2023-21939: Swing HTML parsing issue (8296832)
- CVE-2023-21954: Incorrect enqueue of references in garbage collector (8298191)
- CVE-2023-21967: Certificate validation issue in TLS session negotiation (8298310)
- CVE-2023-21968: Missing check for slash characters in URI-to-path conversion (8298667)
- Update tzdata requirement to 2023c to match JDK-8305113
- Include JDK-8271199 fix from the upcoming jdk8u382 in advance
- Remove patches which are not used</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-07-06"/>
          <updated date="2023-07-06"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21968" impact="low" public="20230418">CVE-2023-21968</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21930" impact="important" public="20230418">CVE-2023-21930</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21937" impact="low" public="20230418">CVE-2023-21937</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21938" impact="low" public="20230418">CVE-2023-21938</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21939" impact="moderate" public="20230418">CVE-2023-21939</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-21967" impact="moderate" public="20230418">CVE-2023-21967</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-21954" impact="moderate" public="20230418">CVE-2023-21954</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1688679628012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1689702499" version="1">
      <metadata>
        <title>openldap: Fix of CVE-2023-2953</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1689702499" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1689702499" source="CLSA"/>
        <reference ref_id="CVE-2023-2953" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-2953" source="CVE"/>
        <description>- CVE-2023-2953: added check for strdup failure, to avoid null pointer dereference</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-07-18"/>
          <updated date="2023-07-18"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-2953" impact="important" public="20230530">CVE-2023-2953</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openldap is earlier than 0:2.4.40-16.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1689702499001"/>
        <criteria operator="AND">
          <criterion comment="openldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748002"/>
          <criterion comment="openldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748003"/>
        </criteria>
        <criterion comment="openldap-clients is earlier than 0:2.4.40-16.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1689702499002"/>
        <criteria operator="AND">
          <criterion comment="openldap-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748005"/>
          <criterion comment="openldap-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748006"/>
        </criteria>
        <criterion comment="openldap-devel is earlier than 0:2.4.40-16.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1689702499003"/>
        <criteria operator="AND">
          <criterion comment="openldap-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748008"/>
          <criterion comment="openldap-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748009"/>
        </criteria>
        <criterion comment="openldap-servers is earlier than 0:2.4.40-16.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1689702499004"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748011"/>
          <criterion comment="openldap-servers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748012"/>
        </criteria>
        <criterion comment="openldap-servers-sql is earlier than 0:2.4.40-16.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1689702499005"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers-sql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748014"/>
          <criterion comment="openldap-servers-sql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1689886440" version="1">
      <metadata>
        <title>python: Fix of CVE-2023-24329</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1689886440" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1689886440" source="CLSA"/>
        <reference ref_id="CVE-2023-24329" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-24329" source="CVE"/>
        <description>- CVE-2023-24329: part2: Start stripping C0 control and space chars in `urlsplit`
- Also correct the first CVE-2023-24329 patch: Fix test_attributes_bad_scheme
  to check for non-ascii symbol as first character of url</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-07-20"/>
          <updated date="2023-07-20"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2023-24329" impact="important" public="20230217">CVE-2023-24329</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1689886440001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1689886440002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1689886440003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1689886440004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1689886440005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1689886440006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1691081846" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1691081846" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1691081846" source="CLSA"/>
        <reference ref_id="CVE-2023-22045" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-22045" source="CVE"/>
        <reference ref_id="CVE-2023-22049" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-22049" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u382-b05. That fixes following CVEs:
- CVE-2023-22045: Array indexing integer overflow issue. (8304468)
- CVE-2023-22049: Improper handling of slash characters in URI-to-path conversion (8305312)
- Remove patch for pkcs11 cause issue was fixed in sources</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-03"/>
          <updated date="2023-08-03"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-22045" impact="low" public="20230718">CVE-2023-22045</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-22049" impact="low" public="20230718">CVE-2023-22049</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1691081846012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1691576939" version="1">
      <metadata>
        <title>openssh: Fix of CVE-2023-38408</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1691576939" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1691576939" source="CLSA"/>
        <reference ref_id="CVE-2023-38408" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-38408" source="CVE"/>
        <description>- CVE-2023-38408: checks libraries before dlopen</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-09"/>
          <updated date="2023-08-09"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-428" href="https://cve.tuxcare.com/els/cve/CVE-2023-38408" impact="critical" public="20230720">CVE-2023-38408</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1691576939001"/>
        <criteria operator="AND">
          <criterion comment="openssh isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023002"/>
          <criterion comment="openssh isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023003"/>
        </criteria>
        <criterion comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1691576939002"/>
        <criteria operator="AND">
          <criterion comment="openssh-askpass isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023005"/>
          <criterion comment="openssh-askpass isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023006"/>
        </criteria>
        <criterion comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1691576939003"/>
        <criteria operator="AND">
          <criterion comment="openssh-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023008"/>
          <criterion comment="openssh-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023009"/>
        </criteria>
        <criterion comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1691576939004"/>
        <criteria operator="AND">
          <criterion comment="openssh-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023011"/>
          <criterion comment="openssh-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023012"/>
        </criteria>
        <criterion comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1691576939005"/>
        <criteria operator="AND">
          <criterion comment="openssh-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023014"/>
          <criterion comment="openssh-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023015"/>
        </criteria>
        <criterion comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1691576939006"/>
        <criteria operator="AND">
          <criterion comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023017"/>
          <criterion comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1692108914" version="1">
      <metadata>
        <title>microcode_ctl: Fix of CVE-2023-20593</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1692108914" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1692108914" source="CLSA"/>
        <reference ref_id="CVE-2023-20593" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-20593" source="CVE"/>
        <description>- Update AMD CPU microcode to 2023-07-19 addresses CVE-2023-20593:
  - Addition AMD CPU microcode for processor family 17h: sig 0x008a0f00;
  - Update AMD CPU microcode for processor family 19h: sig 0x00a00f10,
    sig 0x00a00f11, sig 0x00a00f12;
  - Update AMD CPU microcode for processor family 17h: sig 0x00830f10;</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-15"/>
          <updated date="2023-08-15"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-20593" impact="moderate" public="20230724">CVE-2023-20593</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="microcode_ctl is earlier than 3:1.17-33.39.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1692108914001"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262337002"/>
          <criterion comment="microcode_ctl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262337003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1692293040" version="1">
      <metadata>
        <title>amanda: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1692293040" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1692293040" source="CLSA"/>
        <reference ref_id="CVE-2022-37705" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-37705" source="CVE"/>
        <reference ref_id="CVE-2023-30577" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-30577" source="CVE"/>
        <description>- CVE-2022-37705: fix tar option filtering
- CVE-2023-30577: introduce tar option allow list</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-17"/>
          <updated date="2023-08-17"/>
          <cve cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-88" href="https://cve.tuxcare.com/els/cve/CVE-2022-37705" impact="moderate" public="20230416">CVE-2022-37705</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-88" href="https://cve.tuxcare.com/els/cve/CVE-2023-30577" impact="important" public="20230726">CVE-2023-30577</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="amanda is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293040001"/>
        <criteria operator="AND">
          <criterion comment="amanda isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293040002"/>
          <criterion comment="amanda isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293040003"/>
        </criteria>
        <criterion comment="amanda-client is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293040004"/>
        <criteria operator="AND">
          <criterion comment="amanda-client isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293040005"/>
          <criterion comment="amanda-client isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293040006"/>
        </criteria>
        <criterion comment="amanda-devel is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293040007"/>
        <criteria operator="AND">
          <criterion comment="amanda-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293040008"/>
          <criterion comment="amanda-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293040009"/>
        </criteria>
        <criterion comment="amanda-server is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293040010"/>
        <criteria operator="AND">
          <criterion comment="amanda-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293040011"/>
          <criterion comment="amanda-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293040012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1692293238" version="1">
      <metadata>
        <title>samba: Fix of CVE-2022-2127</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1692293238" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1692293238" source="CLSA"/>
        <reference ref_id="CVE-2022-2127" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2127" source="CVE"/>
        <description>- CVE-2022-2127: Fix oud-of-bounds read triggered by maliciously request</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-17"/>
          <updated date="2023-08-17"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-2127" impact="moderate" public="20230720">CVE-2022-2127</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libsmbclient is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238001"/>
        <criteria operator="AND">
          <criterion comment="libsmbclient isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238002"/>
          <criterion comment="libsmbclient isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238003"/>
        </criteria>
        <criterion comment="libsmbclient-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238004"/>
        <criteria operator="AND">
          <criterion comment="libsmbclient-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238005"/>
          <criterion comment="libsmbclient-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238006"/>
        </criteria>
        <criterion comment="samba is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238007"/>
        <criteria operator="AND">
          <criterion comment="samba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238008"/>
          <criterion comment="samba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238009"/>
        </criteria>
        <criterion comment="samba-client is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238010"/>
        <criteria operator="AND">
          <criterion comment="samba-client isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238011"/>
          <criterion comment="samba-client isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238012"/>
        </criteria>
        <criterion comment="samba-common is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238013"/>
        <criteria operator="AND">
          <criterion comment="samba-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238014"/>
          <criterion comment="samba-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238015"/>
        </criteria>
        <criterion comment="samba-doc is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238016"/>
        <criteria operator="AND">
          <criterion comment="samba-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238017"/>
          <criterion comment="samba-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238018"/>
        </criteria>
        <criterion comment="samba-domainjoin-gui is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238019"/>
        <criteria operator="AND">
          <criterion comment="samba-domainjoin-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238020"/>
          <criterion comment="samba-domainjoin-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238021"/>
        </criteria>
        <criterion comment="samba-glusterfs is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238022"/>
        <criteria operator="AND">
          <criterion comment="samba-glusterfs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238023"/>
          <criterion comment="samba-glusterfs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238024"/>
        </criteria>
        <criterion comment="samba-swat is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238025"/>
        <criteria operator="AND">
          <criterion comment="samba-swat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238026"/>
          <criterion comment="samba-swat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238027"/>
        </criteria>
        <criterion comment="samba-winbind is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238028"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238029"/>
          <criterion comment="samba-winbind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238030"/>
        </criteria>
        <criterion comment="samba-winbind-clients is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238031"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238032"/>
          <criterion comment="samba-winbind-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238033"/>
        </criteria>
        <criterion comment="samba-winbind-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238034"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238035"/>
          <criterion comment="samba-winbind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238036"/>
        </criteria>
        <criterion comment="samba-winbind-krb5-locator is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1692293238037"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-krb5-locator isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238038"/>
          <criterion comment="samba-winbind-krb5-locator isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238039"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1692632368" version="1">
      <metadata>
        <title>php: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1692632368" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1692632368" source="CLSA"/>
        <reference ref_id="CVE-2023-3823" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3823" source="CVE"/>
        <reference ref_id="CVE-2023-3824" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3824" source="CVE"/>
        <description>- CVE-2023-3823: Fix external entity loading in XML without enabling by
  sanitizing libxml2 globals before parsing
- CVE-2023-3824: Fix buffer mismanagement in phar_dir_read()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-21"/>
          <updated date="2023-08-21"/>
          <cve cvss3="0.0/" href="https://cve.tuxcare.com/els/cve/CVE-2023-3823" impact="unknown" public="20230811">CVE-2023-3823</cve>
          <cve cvss3="0.0/" href="https://cve.tuxcare.com/els/cve/CVE-2023-3824" impact="unknown" public="20230811">CVE-2023-3824</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1692632368027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1693410662" version="1">
      <metadata>
        <title>microcode_ctl: Fix of CVE-2022-40982</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1693410662" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1693410662" source="CLSA"/>
        <reference ref_id="CVE-2022-40982" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-40982" source="CVE"/>
        <description>- Update Intel CPU microcode to microcode-20230808 release addresses
  CVE-2022-40982:
  - Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
  - Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
  - Addition of 06-ba-03/0xe0 microcode (in microcode.dat) at revision 0x4119;
  - Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
  - Addition of 06-ba-02/0xe0 microcode (in microcode.dat) at revision 0x4119;
  - Addition of 06-ba-03/0xe0 microcode (in microcode.dat) at revision 0x4119;
  - Addition of 06-be-00/0x11 microcode (in microcode.dat) at revision 0x11;
  - Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
  - Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
  - Removal of 06-ba-03/0xc0 microcode (in microcode.dat) at revision 0x4112;
  - Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
  - Removal of 06-ba-02/0xc0 microcode (in microcode.dat) at revision 0x4112;
  - Removal of 06-ba-03/0xc0 microcode (in microcode.dat) at revision 0x4112;
  - Removal of 06-be-00/0x01 microcode (in microcode.dat) at revision 0x10;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode (in microcode.dat) from
    revision 0x1000171 up to 0x1000181;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
    microcode.dat) from revision 0x2006f05 up to 0x2007006;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode (in microcode.dat) from
    revision 0x4003501 up to 0x4003604;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
    from revision 0x5003501 up to 0x5003604;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode (in microcode.dat) from
    revision 0x7002601 up to 0x7002703;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd000390 up to 0xd0003a5;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
    revision 0xba up to 0xbc;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat) from
    revision 0xaa up to 0xac;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in microcode.dat) from
    revision 0x2a up to 0x2c;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in microcode.dat) from
    revision 0x44 up to 0x46;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in microcode.dat) from
    revision 0xf2 up to 0xf4;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in microcode.dat)
    from revision 0xf2 up to 0xf4;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    microcode.dat) from revision 0xf2 up to 0xf4;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in microcode.dat) from
    revision 0xf2 up to 0xf4;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in microcode.dat) from revision 0xf6 up to 0xf8;
  - Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Update of 06-8f-04/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in microcode.dat) from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 microcode (in microcode.dat) from revision
    0x2b000461 up to 0x2b0004b1;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Removal of 06-8f-08/0x10 microcode (in microcode.dat) at revision
    0x2c0001d1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Addition of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Removal of 06-8f-08/0x87 microcode (in microcode.dat) at revision
    0x2b000461;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
  - Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
  - Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
  - Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
  - Update of 06-9a-04/0x80 microcode (in microcode.dat) from revision 0x42a up
    to 0x42c;
  - Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
  - Addition of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42c;
  - Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
  - Removal of 06-9a-03/0x80 microcode (in microcode.dat) at revision 0x42a;
  - Update of 06-9a-04/0x80 microcode (in microcode.dat) from revision 0x42a up
    to 0x42c;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    microcode.dat) from revision 0xf2 up to 0xf4;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
    from revision 0xf2 up to 0xf4;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in microcode.dat) from
    revision 0xf2 up to 0xf4;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in microcode.dat)
    from revision 0xf2 up to 0xf4;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfa;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode (in microcode.dat) from
    revision 0xf6 up to 0xf8;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
    revision 0xf6 up to 0xf8;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat) from
    revision 0xf6 up to 0xf8;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
    revision 0xf6 up to 0xf8;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat) from
    revision 0xf6 up to 0xf8;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x58 up to 0x59;
  - Update of 06-b7-01/0x32 microcode (in microcode.dat) from revision 0x113 up
    to 0x119;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Addition of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2e;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Removal of 06-97-02/0x07 microcode (in microcode.dat) at revision 0x2c;
  - Update of 06-97-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-02/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-05/0x07 microcode (in microcode.dat) from revision 0x2c up
    to 0x2e;</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-08-30"/>
          <updated date="2023-08-30"/>
          <cve cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cwe="CWE-203" href="https://cve.tuxcare.com/els/cve/CVE-2022-40982" impact="moderate" public="20230811">CVE-2022-40982</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="microcode_ctl is earlier than 3:1.17-33.40.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1693410662001"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262337002"/>
          <criterion comment="microcode_ctl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262337003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1693906015" version="1">
      <metadata>
        <title>busybox: Fix of CVE-2022-48174</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1693906015" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1693906015" source="CLSA"/>
        <reference ref_id="CVE-2022-48174" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48174" source="CVE"/>
        <description>- CVE-2022-48174: fix unlikely stack overflow
- testsuite was enabled</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-09-05"/>
          <updated date="2023-09-05"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-48174" impact="critical" public="20230822">CVE-2022-48174</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="busybox is earlier than 1:1.15.1-21.el6_6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1693906015001"/>
        <criteria operator="AND">
          <criterion comment="busybox isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650376937002"/>
          <criterion comment="busybox isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650376937003"/>
        </criteria>
        <criterion comment="busybox-petitboot is earlier than 1:1.15.1-21.el6_6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1693906015002"/>
        <criteria operator="AND">
          <criterion comment="busybox-petitboot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650376937005"/>
          <criterion comment="busybox-petitboot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650376937006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1694536738" version="1">
      <metadata>
        <title>binutils: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1694536738" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1694536738" source="CLSA"/>
        <reference ref_id="CVE-2021-46174" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-46174" source="CVE"/>
        <reference ref_id="CVE-2022-47673" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-47673" source="CVE"/>
        <reference ref_id="CVE-2022-47695" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-47695" source="CVE"/>
        <reference ref_id="CVE-2022-47696" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-47696" source="CVE"/>
        <description>- CVE-2022-47673: Fix multiple out of bound reads which may cause a DoS
- CVE-2022-47695: Fix NULL pointer segmentation fault which may cause a DoS
- CVE-2022-47696: Fix read of unitialized field which may cause a DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-09-12"/>
          <updated date="2023-09-12"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-46174" impact="important" public="20230822">CVE-2021-46174</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-47673" impact="important" public="20230822">CVE-2022-47673</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-47695" impact="important" public="20230822">CVE-2022-47695</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-47696" impact="important" public="20230822">CVE-2022-47696</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1694536738001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1694536738002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1695063163" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-4733</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1695063163" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1695063163" source="CLSA"/>
        <reference ref_id="CVE-2023-4733" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4733" source="CVE"/>
        <description>- CVE-2023-4733: verify oldwin pointer after reset_VIsual()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-09-18"/>
          <updated date="2023-09-18"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-4733" impact="important" public="20230904">CVE-2023-4733</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" test_ref="oval:com.tuxcare.clsa:tst:1695063163001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" test_ref="oval:com.tuxcare.clsa:tst:1695063163002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" test_ref="oval:com.tuxcare.clsa:tst:1695063163003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" test_ref="oval:com.tuxcare.clsa:tst:1695063163004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" test_ref="oval:com.tuxcare.clsa:tst:1695063163005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1695319372" version="1">
      <metadata>
        <title>vim: Fix of CVE-2023-4736</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1695319372" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1695319372" source="CLSA"/>
        <reference ref_id="CVE-2023-4781" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4781" source="CVE"/>
        <reference ref_id="CVE-2023-4751" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4751" source="CVE"/>
        <reference ref_id="CVE-2023-4736" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4736" source="CVE"/>
        <reference ref_id="CVE-2023-4752" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4752" source="CVE"/>
        <description>- CVE-2023-4736: improve search path to avoid run an executable in untrusted dir</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-09-21"/>
          <updated date="2023-09-21"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2023-4781" impact="important" public="20230905">CVE-2023-4781</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-4751" impact="important" public="20230903">CVE-2023-4751</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-426" href="https://cve.tuxcare.com/els/cve/CVE-2023-4736" impact="important" public="20230902">CVE-2023-4736</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-4752" impact="important" public="20230904">CVE-2023-4752</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" test_ref="oval:com.tuxcare.clsa:tst:1695319372001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" test_ref="oval:com.tuxcare.clsa:tst:1695319372002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" test_ref="oval:com.tuxcare.clsa:tst:1695319372003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" test_ref="oval:com.tuxcare.clsa:tst:1695319372004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" test_ref="oval:com.tuxcare.clsa:tst:1695319372005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1695835423" version="1">
      <metadata>
        <title>libssh2: Fix of CVE-2020-22218</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1695835423" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1695835423" source="CLSA"/>
        <reference ref_id="CVE-2020-22218" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-22218" source="CVE"/>
        <description>- CVE-2020-22218: doing total_num zero length check</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-09-27"/>
          <updated date="2023-09-27"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2020-22218" impact="important" public="20230822">CVE-2020-22218</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libssh2 is earlier than 0:1.4.2-3.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1695835423001"/>
        <criteria operator="AND">
          <criterion comment="libssh2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1695835423002"/>
          <criterion comment="libssh2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1695835423003"/>
        </criteria>
        <criterion comment="libssh2-devel is earlier than 0:1.4.2-3.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1695835423004"/>
        <criteria operator="AND">
          <criterion comment="libssh2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1695835423005"/>
          <criterion comment="libssh2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1695835423006"/>
        </criteria>
        <criterion comment="libssh2-docs is earlier than 0:1.4.2-3.el6_10.1.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1695835423007"/>
        <criteria operator="AND">
          <criterion comment="libssh2-docs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1695835423008"/>
          <criterion comment="libssh2-docs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1695835423009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1696878189" version="1">
      <metadata>
        <title>python: Fix of CVE-2022-48565</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1696878189" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1696878189" source="CLSA"/>
        <reference ref_id="CVE-2022-48565" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48565" source="CVE"/>
        <description>- CVE-2022-48565: Reject XML entity declarations in plist files</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-09"/>
          <updated date="2023-10-09"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-611" href="https://cve.tuxcare.com/els/cve/CVE-2022-48565" impact="critical" public="20230822">CVE-2022-48565</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1696878189001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1696878189002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1696878189003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1696878189004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1696878189005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1696878189006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1696971066" version="1">
      <metadata>
        <title>binutils: Fix of CVE-2020-19726</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1696971066" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1696971066" source="CLSA"/>
        <reference ref_id="CVE-2020-19726" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-19726" source="CVE"/>
        <description>- CVE-2020-19726: Fix an illegal memory access in the BFD library which can be
  triggered by attempting to parse a corrupt PE format file</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-10"/>
          <updated date="2023-10-10"/>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2020-19726" impact="important" public="20230822">CVE-2020-19726</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1696971066001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1696971066002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1697136085" version="1">
      <metadata>
        <title>libwebp: Fix of CVE-2023-1999</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1697136085" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1697136085" source="CLSA"/>
        <reference ref_id="CVE-2023-1999" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1999" source="CVE"/>
        <description>- CVE-2023-1999: avoids a double free</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-12"/>
          <updated date="2023-10-12"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2023-1999" impact="important" public="20230620">CVE-2023-1999</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libwebp is earlier than 0:0.4.3-3.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1697136085001"/>
        <criteria operator="AND">
          <criterion comment="libwebp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085002"/>
          <criterion comment="libwebp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085003"/>
        </criteria>
        <criterion comment="libwebp-devel is earlier than 0:0.4.3-3.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1697136085004"/>
        <criteria operator="AND">
          <criterion comment="libwebp-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085005"/>
          <criterion comment="libwebp-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085006"/>
        </criteria>
        <criterion comment="libwebp-java is earlier than 0:0.4.3-3.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1697136085007"/>
        <criteria operator="AND">
          <criterion comment="libwebp-java isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085008"/>
          <criterion comment="libwebp-java isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085009"/>
        </criteria>
        <criterion comment="libwebp-tools is earlier than 0:0.4.3-3.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1697136085010"/>
        <criteria operator="AND">
          <criterion comment="libwebp-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085011"/>
          <criterion comment="libwebp-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1697136232" version="1">
      <metadata>
        <title>bind: Fix of CVE-2023-3341</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1697136232" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1697136232" source="CLSA"/>
        <reference ref_id="CVE-2023-3341" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3341" source="CVE"/>
        <description>- CVE-2023-3341: Limit isccc_cc_fromwire recursion depth</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-12"/>
          <updated date="2023-10-12"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-3341" impact="important" public="20230920">CVE-2023-3341</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1697136232001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1697136232002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1697136232003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1697136232004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1697136232005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1697136232006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1697464688" version="1">
      <metadata>
        <title>curl: Fix of CVE-2023-38546</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1697464688" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1697464688" source="CLSA"/>
        <reference ref_id="CVE-2023-38546" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-38546" source="CVE"/>
        <description>- CVE-2023-38546: cookie: remove unnecessary struct fields
- Rebuild expired test certificates</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-16"/>
          <updated date="2023-10-16"/>
          <cve cvss3="5.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cwe="CWE-73" href="https://cve.tuxcare.com/els/cve/CVE-2023-38546" impact="moderate" public="20231011">CVE-2023-38546</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1697464688001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1697464688002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1697464688003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1697482739" version="1">
      <metadata>
        <title>exim: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1697482739" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1697482739" source="CLSA"/>
        <reference ref_id="CVE-2023-42114" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-42114" source="CVE"/>
        <reference ref_id="CVE-2023-42116" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-42116" source="CVE"/>
        <description>- CVE-2023-42114: fix possible OOB read in SPA authenticator
- CVE-2023-42116: fix possible OOB write in SPA authenticator</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-16"/>
          <updated date="2023-10-16"/>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-42114" impact="low" public="20230927">CVE-2023-42114</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2023-42116" impact="important" public="20230927">CVE-2023-42116</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1697482739001"/>
        <criteria operator="AND">
          <criterion comment="exim isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670002"/>
          <criterion comment="exim isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670003"/>
        </criteria>
        <criterion comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1697482739002"/>
        <criteria operator="AND">
          <criterion comment="exim-greylist isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670005"/>
          <criterion comment="exim-greylist isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670006"/>
        </criteria>
        <criterion comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1697482739003"/>
        <criteria operator="AND">
          <criterion comment="exim-mon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670008"/>
          <criterion comment="exim-mon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670009"/>
        </criteria>
        <criterion comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1697482739004"/>
        <criteria operator="AND">
          <criterion comment="exim-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670011"/>
          <criterion comment="exim-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670012"/>
        </criteria>
        <criterion comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1697482739005"/>
        <criteria operator="AND">
          <criterion comment="exim-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670014"/>
          <criterion comment="exim-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1697817200" version="1">
      <metadata>
        <title>quagga: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1697817200" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1697817200" source="CLSA"/>
        <reference ref_id="CVE-2023-41358" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-41358" source="CVE"/>
        <reference ref_id="CVE-2023-41360" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-41360" source="CVE"/>
        <description>- CVE-2023-41360: don't read the first byte of ORF header if we are ahead of
  stream
- CVE-2023-41358: do not process NLRIs if the attribute length is zero</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-20"/>
          <updated date="2023-10-20"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-41358" impact="important" public="20230829">CVE-2023-41358</cve>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-41360" impact="critical" public="20230829">CVE-2023-41360</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="quagga is earlier than 0:0.99.15-14.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1697817200001"/>
        <criteria operator="AND">
          <criterion comment="quagga isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643112395002"/>
          <criterion comment="quagga isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643112395003"/>
        </criteria>
        <criterion comment="quagga-contrib is earlier than 0:0.99.15-14.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1697817200002"/>
        <criteria operator="AND">
          <criterion comment="quagga-contrib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643112395005"/>
          <criterion comment="quagga-contrib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643112395006"/>
        </criteria>
        <criterion comment="quagga-devel is earlier than 0:0.99.15-14.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1697817200003"/>
        <criteria operator="AND">
          <criterion comment="quagga-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1643112395008"/>
          <criterion comment="quagga-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1643112395009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1698101447" version="1">
      <metadata>
        <title>nginx: Fix of CVE-2023-44487</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1698101447" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1698101447" source="CLSA"/>
        <reference ref_id="CVE-2023-44487" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-44487" source="CVE"/>
        <description>- CVE-2023-44487: HTTP/2 - per-iteration stream handling limit</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-23"/>
          <updated date="2023-10-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2023-44487" impact="important" public="20231010">CVE-2023-44487</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nginx is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447001"/>
        <criteria operator="AND">
          <criterion comment="nginx isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762002"/>
          <criterion comment="nginx isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762003"/>
        </criteria>
        <criterion comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447002"/>
        <criteria operator="AND">
          <criterion comment="nginx-all-modules isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762005"/>
          <criterion comment="nginx-all-modules isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762006"/>
        </criteria>
        <criterion comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447003"/>
        <criteria operator="AND">
          <criterion comment="nginx-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762008"/>
          <criterion comment="nginx-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762009"/>
        </criteria>
        <criterion comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447004"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-geoip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762011"/>
          <criterion comment="nginx-mod-http-geoip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762012"/>
        </criteria>
        <criterion comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447005"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-image-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762014"/>
          <criterion comment="nginx-mod-http-image-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762015"/>
        </criteria>
        <criterion comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447006"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762017"/>
          <criterion comment="nginx-mod-http-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762018"/>
        </criteria>
        <criterion comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447007"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762020"/>
          <criterion comment="nginx-mod-http-xslt-filter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762021"/>
        </criteria>
        <criterion comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447008"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-mail isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762023"/>
          <criterion comment="nginx-mod-mail isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762024"/>
        </criteria>
        <criterion comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1698101447009"/>
        <criteria operator="AND">
          <criterion comment="nginx-mod-stream isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261762026"/>
          <criterion comment="nginx-mod-stream isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261762027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1698101603" version="1">
      <metadata>
        <title>python: Fix of CVE-2022-48560</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1698101603" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1698101603" source="CLSA"/>
        <reference ref_id="CVE-2022-48560" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48560" source="CVE"/>
        <description>- CVE-2022-48560: Fix SIGSEGV in Python via heappushpop in heapq</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-23"/>
          <updated date="2023-10-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-48560" impact="important" public="20230822">CVE-2022-48560</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1698101603001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1698101603002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1698101603003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1698101603004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1698101603005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1698101603006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1698180806" version="1">
      <metadata>
        <title>zlib: Fix of CVE-2023-45853</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1698180806" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1698180806" source="CLSA"/>
        <reference ref_id="CVE-2023-45853" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-45853" source="CVE"/>
        <description>- CVE-2023-45853: Reject overflows of zip header fields in minizip</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-24"/>
          <updated date="2023-10-24"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2023-45853" impact="critical" public="20231014">CVE-2023-45853</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1698180806001"/>
        <criteria operator="AND">
          <criterion comment="minizip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231002"/>
          <criterion comment="minizip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231003"/>
        </criteria>
        <criterion comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1698180806002"/>
        <criteria operator="AND">
          <criterion comment="minizip-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231005"/>
          <criterion comment="minizip-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231006"/>
        </criteria>
        <criterion comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1698180806003"/>
        <criteria operator="AND">
          <criterion comment="zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231008"/>
          <criterion comment="zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231009"/>
        </criteria>
        <criterion comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1698180806004"/>
        <criteria operator="AND">
          <criterion comment="zlib-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231011"/>
          <criterion comment="zlib-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231012"/>
        </criteria>
        <criterion comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1698180806005"/>
        <criteria operator="AND">
          <criterion comment="zlib-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231014"/>
          <criterion comment="zlib-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1698352063" version="1">
      <metadata>
        <title>vim: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1698352063" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1698352063" source="CLSA"/>
        <reference ref_id="CVE-2023-5441" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-5441" source="CVE"/>
        <reference ref_id="CVE-2023-5344" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-5344" source="CVE"/>
        <description>- CVE-2023-5441: segfault in exmode
- CVE-2023-5344: buffer overflow in trunc_string()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-10-26"/>
          <updated date="2023-10-26"/>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-5441" impact="moderate" public="20231005">CVE-2023-5441</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-5344" impact="important" public="20231002">CVE-2023-5344</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" test_ref="oval:com.tuxcare.clsa:tst:1698352063001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" test_ref="oval:com.tuxcare.clsa:tst:1698352063002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" test_ref="oval:com.tuxcare.clsa:tst:1698352063003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" test_ref="oval:com.tuxcare.clsa:tst:1698352063004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" test_ref="oval:com.tuxcare.clsa:tst:1698352063005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1699381307" version="1">
      <metadata>
        <title>libxml2: Fix of CVE-2016-4658</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1699381307" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1699381307" source="CLSA"/>
        <reference ref_id="CVE-2016-4658" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-4658" source="CVE"/>
        <description>- CVE-2016-4658: disallow namespace nodes in XPointer ranges</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-07"/>
          <updated date="2023-11-07"/>
          <cve cvss2="10.0/AV:N/AC:L/Au:N/C:C/I:C/A:C" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2016-4658" impact="critical" public="20160925">CVE-2016-4658</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1699381307001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1699381307002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1699381307003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1699381307004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1699908139" version="1">
      <metadata>
        <title>exim: Fix of CVE-2022-3559</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1699908139" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1699908139" source="CLSA"/>
        <reference ref_id="CVE-2022-3559" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3559" source="CVE"/>
        <description>- CVE-2022-3559: Fix $regex&lt;n&gt; use-after-free</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-13"/>
          <updated date="2023-11-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2022-3559" impact="important" public="20221017">CVE-2022-3559</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1699908139001"/>
        <criteria operator="AND">
          <criterion comment="exim isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670002"/>
          <criterion comment="exim isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670003"/>
        </criteria>
        <criterion comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1699908139002"/>
        <criteria operator="AND">
          <criterion comment="exim-greylist isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670005"/>
          <criterion comment="exim-greylist isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670006"/>
        </criteria>
        <criterion comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1699908139003"/>
        <criteria operator="AND">
          <criterion comment="exim-mon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670008"/>
          <criterion comment="exim-mon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670009"/>
        </criteria>
        <criterion comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1699908139004"/>
        <criteria operator="AND">
          <criterion comment="exim-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670011"/>
          <criterion comment="exim-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670012"/>
        </criteria>
        <criterion comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1699908139005"/>
        <criteria operator="AND">
          <criterion comment="exim-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670014"/>
          <criterion comment="exim-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1700164396" version="1">
      <metadata>
        <title>squid: Fix of CVE-2023-46847</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1700164396" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1700164396" source="CLSA"/>
        <reference ref_id="CVE-2023-46847" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-46847" source="CVE"/>
        <description>- CVE-2023-46847: Fix stack buffer overflow when parsing Digest Authorization</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-16"/>
          <updated date="2023-11-16"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2023-46847" impact="important" public="20231103">CVE-2023-46847</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1700164396001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1700591071" version="1">
      <metadata>
        <title>kernel: Fix of 10 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1700591071" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1700591071" source="CLSA"/>
        <reference ref_id="CVE-2022-0850" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-0850" source="CVE"/>
        <reference ref_id="CVE-2019-10220" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-10220" source="CVE"/>
        <reference ref_id="CVE-2019-19074" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-19074" source="CVE"/>
        <reference ref_id="CVE-2019-19448" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-19448" source="CVE"/>
        <reference ref_id="CVE-2020-36386" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36386" source="CVE"/>
        <reference ref_id="CVE-2022-26365" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-26365" source="CVE"/>
        <reference ref_id="CVE-2023-31436" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-31436" source="CVE"/>
        <reference ref_id="CVE-2023-3141" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3141" source="CVE"/>
        <reference ref_id="CVE-2023-23559" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-23559" source="CVE"/>
        <reference ref_id="CVE-2022-2639" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2639" source="CVE"/>
        <description>- openvswitch: fix OOB access in reserve_sfa_size() {CVE-2022-2639}
- xen/blkfront: fix leaking data in shared pages {CVE-2022-26365}
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() {CVE-2020-36386}
- btrfs: only search for left_info if there is no right_info in try_merge_free_space {CVE-2019-19448}
- filldir[64]: remove WARN_ON_ONCE() for bad directory entries {CVE-2019-10220}
- Make filldir[64]() verify the directory entry filename is valid {CVE-2019-10220}
- ath9k: release allocated buffer if timed out {CVE-2019-19074}
- net: sched: sch_qfq: prevent slab-out-of-bounds in {CVE-2023-31436}
- memstick: r592: Fix UAF bug in r592_remove due to race {CVE-2023-3141}
- wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid {CVE-2023-23559}
- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-21"/>
          <updated date="2023-11-21"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-0850" impact="important" public="20220829">CVE-2022-0850</cve>
          <cve cvss2="9.3/AV:N/AC:M/Au:N/C:C/I:C/A:C" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els/cve/CVE-2019-10220" impact="important" public="20191127">CVE-2019-10220</cve>
          <cve cvss2="7.8/AV:N/AC:L/Au:N/C:N/I:N/A:C" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-401" href="https://cve.tuxcare.com/els/cve/CVE-2019-19074" impact="important" public="20191118">CVE-2019-19074</cve>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2019-19448" impact="important" public="20191208">CVE-2019-19448</cve>
          <cve cvss2="5.6/AV:L/AC:L/Au:N/C:P/I:N/A:C" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-36386" impact="important" public="20210607">CVE-2020-36386</cve>
          <cve cvss2="3.6/AV:L/AC:L/Au:N/C:P/I:N/A:P" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-401" href="https://cve.tuxcare.com/els/cve/CVE-2022-26365" impact="important" public="20220705">CVE-2022-26365</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-31436" impact="important" public="20230428">CVE-2023-31436</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-3141" impact="important" public="20230609">CVE-2023-3141</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2023-23559" impact="important" public="20230113">CVE-2023-23559</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-681" href="https://cve.tuxcare.com/els/cve/CVE-2022-2639" impact="important" public="20220901">CVE-2022-2639</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1700591071001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1700591071008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1700852317" version="1">
      <metadata>
        <title>samba: Fix of CVE-2023-3961</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1700852317" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1700852317" source="CLSA"/>
        <reference ref_id="CVE-2023-3961" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3961" source="CVE"/>
        <description>- CVE-2023-3961: Fix a path traversal out of the socket directory
- fix chagelog's versions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-24"/>
          <updated date="2023-11-24"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-22" href="https://cve.tuxcare.com/els/cve/CVE-2023-3961" impact="critical" public="20231103">CVE-2023-3961</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libsmbclient is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317001"/>
        <criteria operator="AND">
          <criterion comment="libsmbclient isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238002"/>
          <criterion comment="libsmbclient isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238003"/>
        </criteria>
        <criterion comment="libsmbclient-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317002"/>
        <criteria operator="AND">
          <criterion comment="libsmbclient-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238005"/>
          <criterion comment="libsmbclient-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238006"/>
        </criteria>
        <criterion comment="samba is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317003"/>
        <criteria operator="AND">
          <criterion comment="samba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238008"/>
          <criterion comment="samba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238009"/>
        </criteria>
        <criterion comment="samba-client is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317004"/>
        <criteria operator="AND">
          <criterion comment="samba-client isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238011"/>
          <criterion comment="samba-client isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238012"/>
        </criteria>
        <criterion comment="samba-common is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317005"/>
        <criteria operator="AND">
          <criterion comment="samba-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238014"/>
          <criterion comment="samba-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238015"/>
        </criteria>
        <criterion comment="samba-doc is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317006"/>
        <criteria operator="AND">
          <criterion comment="samba-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238017"/>
          <criterion comment="samba-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238018"/>
        </criteria>
        <criterion comment="samba-domainjoin-gui is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317007"/>
        <criteria operator="AND">
          <criterion comment="samba-domainjoin-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238020"/>
          <criterion comment="samba-domainjoin-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238021"/>
        </criteria>
        <criterion comment="samba-glusterfs is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317008"/>
        <criteria operator="AND">
          <criterion comment="samba-glusterfs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238023"/>
          <criterion comment="samba-glusterfs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238024"/>
        </criteria>
        <criterion comment="samba-swat is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317009"/>
        <criteria operator="AND">
          <criterion comment="samba-swat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238026"/>
          <criterion comment="samba-swat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238027"/>
        </criteria>
        <criterion comment="samba-winbind is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317010"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238029"/>
          <criterion comment="samba-winbind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238030"/>
        </criteria>
        <criterion comment="samba-winbind-clients is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317011"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238032"/>
          <criterion comment="samba-winbind-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238033"/>
        </criteria>
        <criterion comment="samba-winbind-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317012"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238035"/>
          <criterion comment="samba-winbind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238036"/>
        </criteria>
        <criterion comment="samba-winbind-krb5-locator is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1700852317013"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-krb5-locator isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238038"/>
          <criterion comment="samba-winbind-krb5-locator isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238039"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1701285908" version="1">
      <metadata>
        <title>exim: Fix of CVE-2023-42117</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1701285908" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1701285908" source="CLSA"/>
        <reference ref_id="CVE-2023-42117" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-42117" source="CVE"/>
        <description>- CVE-2023-42117: fix string_is_ip_address()</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-29"/>
          <updated date="2023-11-29"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-77" href="https://cve.tuxcare.com/els/cve/CVE-2023-42117" impact="important" public="20230927">CVE-2023-42117</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1701285908001"/>
        <criteria operator="AND">
          <criterion comment="exim isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670002"/>
          <criterion comment="exim isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670003"/>
        </criteria>
        <criterion comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1701285908002"/>
        <criteria operator="AND">
          <criterion comment="exim-greylist isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670005"/>
          <criterion comment="exim-greylist isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670006"/>
        </criteria>
        <criterion comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1701285908003"/>
        <criteria operator="AND">
          <criterion comment="exim-mon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670008"/>
          <criterion comment="exim-mon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670009"/>
        </criteria>
        <criterion comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1701285908004"/>
        <criteria operator="AND">
          <criterion comment="exim-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670011"/>
          <criterion comment="exim-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670012"/>
        </criteria>
        <criterion comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1701285908005"/>
        <criteria operator="AND">
          <criterion comment="exim-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660761670014"/>
          <criterion comment="exim-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660761670015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1701286147" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2023-46724</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1701286147" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1701286147" source="CLSA"/>
        <reference ref_id="CVE-2023-46724" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-46724" source="CVE"/>
        <description>- CVE-2023-46724: Fix validation of certificates with CN=*</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-29"/>
          <updated date="2023-11-29"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-295" href="https://cve.tuxcare.com/els/cve/CVE-2023-46724" impact="important" public="20231101">CVE-2023-46724</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1701286147001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1701286463" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2023-46847</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1701286463" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1701286463" source="CLSA"/>
        <reference ref_id="CVE-2023-46847" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-46847" source="CVE"/>
        <description>- CVE-2023-46847: Fix stack buffer overflow when parsing Digest Authorization</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-11-29"/>
          <updated date="2023-11-29"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2023-46847" impact="important" public="20231103">CVE-2023-46847</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1701286463001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1701445092" version="1">
      <metadata>
        <title>libksba: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1701445092" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1701445092" source="CLSA"/>
        <reference ref_id="CVE-2022-47629" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-47629" source="CVE"/>
        <reference ref_id="CVE-2022-3515" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3515" source="CVE"/>
        <description>- CVE-2022-3515: detect a possible overflow directly in the TLV parser
- CVE-2022-47629: fix an integer overflow in the CRL signature parser</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-01"/>
          <updated date="2023-12-01"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-47629" impact="critical" public="20221220">CVE-2022-47629</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-3515" impact="critical" public="20230112">CVE-2022-3515</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libksba is earlier than 0:1.0.7-4.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1701445092001"/>
        <criteria operator="AND">
          <criterion comment="libksba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1701445092002"/>
          <criterion comment="libksba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1701445092003"/>
        </criteria>
        <criterion comment="libksba-devel is earlier than 0:1.0.7-4.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1701445092004"/>
        <criteria operator="AND">
          <criterion comment="libksba-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1701445092005"/>
          <criterion comment="libksba-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1701445092006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1702421029" version="1">
      <metadata>
        <title>microcode_ctl: Fix of CVE-2023-23583</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1702421029" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1702421029" source="CLSA"/>
        <reference ref_id="CVE-2023-23583" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-23583" source="CVE"/>
        <description>- Update Intel CPU microcode to microcode-20231114 release, addresses
  CVE-2023-23583 (INTEL-SA-00950):
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in 06-6a-06) from revision
    0xd0003a5 up to 0xd0003b9;
  - Update of 06-6c-01/0x10 (ICL-D B0) microcode (in 06-6c-01) from revision
    0x1000230 up to 0x1000268;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in 06-7e-05) from revision
    0xbc up to 0xc2;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in 06-8c-01) from
    revision 0xac up to 0xb4;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in 06-8c-02) from revision
    0x2c up to 0x34;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in 06-8d-01) from revision
    0x46 up to 0x4e;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-04) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-04) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-04) from revision
    0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-04) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-04) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-04) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-04) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
    0x2b0004b1;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-05) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-05) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-05) from revision
    0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-05) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-05) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-05) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-05) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
    0x2b0004b1;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-06) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-06) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-06) from revision
    0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-06) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-06) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-06) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-06) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
    0x2b0004b1;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-07) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-07) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-07) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-07) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
    0x2b0004b1;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-08) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-08) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-08) from revision
    0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-08) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-08) from revision 0x2c000271 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-08) from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-08) from
    revision 0x2b0004b1 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000271;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000271;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
    0x2b0004b1;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
    0x2b0004b1;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x2e;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-02) from
    revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2e
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2e
    up to 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x2e;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-05) from
    revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2e
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2e
    up to 0x32;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x430;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x42c;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x42c;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-03) from
    revision 0x42c up to 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x430;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x42c;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x42c;
  - Update of 06-9a-04/0x40 (AZB A0) microcode (in 06-9a-04) from revision 0x4
    up to 0x5;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-04) from
    revision 0x42c up to 0x430;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode (in 06-a7-01) from revision
    0x59 up to 0x5d;
  - Update of 06-b7-01/0x32 (RPL-S B0) microcode (in 06-b7-01) from revision
    0x119 up to 0x11d;
  - Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
    revision 0x411c;
  - Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
    revision 0x411c;
  - Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
    revision 0x4119;
  - Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-02) at
    revision 0x4119;
  - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in 06-ba-02) from
    revision 0x4119 up to 0x411c;
  - Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
    revision 0x411c;
  - Addition of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
    revision 0x411c;
  - Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
    revision 0x4119;
  - Removal of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in 06-ba-03) at
    revision 0x4119;
  - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in 06-ba-03) from
    revision 0x4119 up to 0x411c;
  - Update of 06-be-00/0x11 (ADL-N A0) microcode (in 06-be-00) from revision
    0x11 up to 0x12;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x2e;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-02) from
    revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2e
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2e
    up to 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x2e;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-05) from
    revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2e
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2e
    up to 0x32.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-12"/>
          <updated date="2023-12-12"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-23583" impact="important" public="20231114">CVE-2023-23583</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="microcode_ctl is earlier than 3:1.17-33.41.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1702421029001"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262337002"/>
          <criterion comment="microcode_ctl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262337003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1702496332" version="1">
      <metadata>
        <title>squid: Fix of CVE-2023-46728</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1702496332" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1702496332" source="CLSA"/>
        <reference ref_id="CVE-2023-46728" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-46728" source="CVE"/>
        <description>- CVE-2023-46728: Remove support for Gopher protocol
- Enable test-suite</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-13"/>
          <updated date="2023-12-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-46728" impact="important" public="20231106">CVE-2023-46728</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1702496332001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1702496473" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2023-46728</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1702496473" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1702496473" source="CLSA"/>
        <reference ref_id="CVE-2023-46728" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-46728" source="CVE"/>
        <description>- CVE-2023-46728: Remove support for Gopher protocol</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-13"/>
          <updated date="2023-12-13"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-46728" impact="important" public="20231106">CVE-2023-46728</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1702496473001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1703183093" version="1">
      <metadata>
        <title>haproxy: Fix of CVE-2023-45539</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1703183093" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1703183093" source="CLSA"/>
        <reference ref_id="CVE-2023-45539" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-45539" source="CVE"/>
        <description>- CVE-2023-45539: do not accept '#' as part of the URI component</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-21"/>
          <updated date="2023-12-21"/>
          <cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-45539" impact="important" public="20231128">CVE-2023-45539</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="haproxy is earlier than 0:1.5.18-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1703183093001"/>
        <criteria operator="AND">
          <criterion comment="haproxy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1703183093002"/>
          <criterion comment="haproxy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1703183093003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1703183242" version="1">
      <metadata>
        <title>squid34: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1703183242" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1703183242" source="CLSA"/>
        <reference ref_id="CVE-2023-49285" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-49285" source="CVE"/>
        <reference ref_id="CVE-2023-49286" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-49286" source="CVE"/>
        <description>- CVE-2023-49285: Fix date parsing in RFC 1123 to prevent Buffer OverRead
- CVE-2023-49286: Fix DoS attack against Helper process management</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-21"/>
          <updated date="2023-12-21"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-49285" impact="important" public="20231204">CVE-2023-49285</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2023-49286" impact="important" public="20231204">CVE-2023-49286</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703183242001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1703183411" version="1">
      <metadata>
        <title>squid: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1703183411" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1703183411" source="CLSA"/>
        <reference ref_id="CVE-2023-49286" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-49286" source="CVE"/>
        <reference ref_id="CVE-2023-49285" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-49285" source="CVE"/>
        <description>- CVE-2023-49285: Fix date parsing in RFC 1123 to prevent Buffer OverRead
- CVE-2023-49286: Fix DoS attack against Helper process management</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-21"/>
          <updated date="2023-12-21"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2023-49286" impact="important" public="20231204">CVE-2023-49286</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-49285" impact="important" public="20231204">CVE-2023-49285</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1703183411001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1703785140" version="1">
      <metadata>
        <title>openssh: Fix of CVE-2023-51385</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2023:1703785140" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2023:1703785140" source="CLSA"/>
        <reference ref_id="CVE-2023-51385" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-51385" source="CVE"/>
        <description>- CVE-2023-51385: ban user/hostnames with most shell metacharacters in
  command line</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2023-12-28"/>
          <updated date="2023-12-28"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://cve.tuxcare.com/els/cve/CVE-2023-51385" impact="critical" public="20231218">CVE-2023-51385</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703785140001"/>
        <criteria operator="AND">
          <criterion comment="openssh isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023002"/>
          <criterion comment="openssh isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023003"/>
        </criteria>
        <criterion comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703785140002"/>
        <criteria operator="AND">
          <criterion comment="openssh-askpass isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023005"/>
          <criterion comment="openssh-askpass isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023006"/>
        </criteria>
        <criterion comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703785140003"/>
        <criteria operator="AND">
          <criterion comment="openssh-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023008"/>
          <criterion comment="openssh-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023009"/>
        </criteria>
        <criterion comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703785140004"/>
        <criteria operator="AND">
          <criterion comment="openssh-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023011"/>
          <criterion comment="openssh-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023012"/>
        </criteria>
        <criterion comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703785140005"/>
        <criteria operator="AND">
          <criterion comment="openssh-server isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023014"/>
          <criterion comment="openssh-server isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023015"/>
        </criteria>
        <criterion comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1703785140006"/>
        <criteria operator="AND">
          <criterion comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1656962023017"/>
          <criterion comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1656962023018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1705079922" version="1">
      <metadata>
        <title>python: Fix of CVE-2023-40217</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1705079922" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1705079922" source="CLSA"/>
        <reference ref_id="CVE-2023-40217" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-40217" source="CVE"/>
        <description>- CVE-2023-40217: Fix TLS handshake bypass</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-01-12"/>
          <updated date="2024-01-12"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-40217" impact="moderate" public="20230825">CVE-2023-40217</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1705079922001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1705079922002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1705079922003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1705079922004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1705079922005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1705079922006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1705494430" version="1">
      <metadata>
        <title>kernel: Fix of 13 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1705494430" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1705494430" source="CLSA"/>
        <reference ref_id="CVE-2023-3567" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3567" source="CVE"/>
        <reference ref_id="CVE-2023-6606" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-6606" source="CVE"/>
        <reference ref_id="CVE-2021-45485" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-45485" source="CVE"/>
        <reference ref_id="CVE-2023-6932" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-6932" source="CVE"/>
        <reference ref_id="CVE-2023-4623" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4623" source="CVE"/>
        <reference ref_id="CVE-2023-40283" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-40283" source="CVE"/>
        <reference ref_id="CVE-2023-3776" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3776" source="CVE"/>
        <reference ref_id="CVE-2023-3111" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3111" source="CVE"/>
        <reference ref_id="CVE-2022-42896" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-42896" source="CVE"/>
        <reference ref_id="CVE-2022-3566" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-3566" source="CVE"/>
        <reference ref_id="CVE-2022-45934" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45934" source="CVE"/>
        <reference ref_id="CVE-2023-1670" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1670" source="CVE"/>
        <reference ref_id="CVE-2023-3268" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3268" source="CVE"/>
        <description>- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach {CVE-2023-1670}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM {CVE-2022-42896}
- tcp: Fix data races around icsk-&gt;icsk_af_ops. {CVE-2022-3566}
- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-01-17"/>
          <updated date="2024-01-17"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-3567" impact="important" public="20230724">CVE-2023-3567</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-6606" impact="important" public="20231208">CVE-2023-6606</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://cve.tuxcare.com/els/cve/CVE-2021-45485" impact="important" public="20211225">CVE-2021-45485</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-6932" impact="important" public="20231219">CVE-2023-6932</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-4623" impact="important" public="20230906">CVE-2023-4623</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-40283" impact="important" public="20230814">CVE-2023-40283</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-3776" impact="important" public="20230721">CVE-2023-3776</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-3111" impact="important" public="20230605">CVE-2023-3111</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-42896" impact="important" public="20221123">CVE-2022-42896</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-3566" impact="important" public="20221017">CVE-2022-3566</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2022-45934" impact="important" public="20221127">CVE-2022-45934</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-1670" impact="important" public="20230330">CVE-2023-1670</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-3268" impact="important" public="20230616">CVE-2023-3268</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1705494430001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1705494430008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1706027577" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2023-50269</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1706027577" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1706027577" source="CLSA"/>
        <reference ref_id="CVE-2023-50269" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-50269" source="CVE"/>
        <description>- CVE-2023-50269: Limit the number of allowed X-Forwarded-For hops to prevent DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-01-23"/>
          <updated date="2024-01-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2023-50269" impact="important" public="20231214">CVE-2023-50269</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1706027577001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1706027727" version="1">
      <metadata>
        <title>squid: Fix of CVE-2023-50269</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1706027727" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1706027727" source="CLSA"/>
        <reference ref_id="CVE-2023-50269" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-50269" source="CVE"/>
        <description>- CVE-2023-50269: Limit the number of allowed X-Forwarded-For hops to prevent DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-01-23"/>
          <updated date="2024-01-23"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2023-50269" impact="important" public="20231214">CVE-2023-50269</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1706027727001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1706698228" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 8 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1706698228" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1706698228" source="CLSA"/>
        <reference ref_id="CVE-2024-20945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20945" source="CVE"/>
        <reference ref_id="CVE-2024-20952" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20952" source="CVE"/>
        <reference ref_id="CVE-2024-20918" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20918" source="CVE"/>
        <reference ref_id="CVE-2024-20919" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20919" source="CVE"/>
        <reference ref_id="CVE-2024-20926" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20926" source="CVE"/>
        <reference ref_id="CVE-2023-22081" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-22081" source="CVE"/>
        <reference ref_id="CVE-2024-20921" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20921" source="CVE"/>
        <reference ref_id="CVE-2023-22067" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-22067" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u402-b06. That fixes following CVEs:
- CVE-2024-20918: Array out-of-bounds access due to missing range check in C1 compiler
- CVE-2024-20919: JVM class file verifier flaw allows unverified bytecode execution
- CVE-2024-20921: Range check loop optimization issue
- CVE-2024-20926: Arbitrary Java code execution in Nashorn
- CVE-2024-20945: Logging of digital signature private keys
- CVE-2024-20952: RSA padding issue and timing side-channel attack against TLS
- CVE-2023-22067: IOR deserialization issue in CORBA (fixed in jdk8u392)
- CVE-2023-22081: Certificate path validation issue during client authentication (fixed in jdk8u392)
- Adapt pr2462 patch to the new sources</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-01-31"/>
          <updated date="2024-01-31"/>
          <cve cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-532" href="https://cve.tuxcare.com/els/cve/CVE-2024-20945" impact="moderate" public="20240116">CVE-2024-20945</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-20952" impact="important" public="20240116">CVE-2024-20952</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-20918" impact="important" public="20240116">CVE-2024-20918</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-20919" impact="moderate" public="20240116">CVE-2024-20919</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-20926" impact="moderate" public="20240116">CVE-2024-20926</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2023-22081" impact="moderate" public="20231017">CVE-2023-22081</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-20921" impact="moderate" public="20240116">CVE-2024-20921</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2023-22067" impact="moderate" public="20231017">CVE-2023-22067</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1706698228012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1708427919" version="1">
      <metadata>
        <title>sudo: Fix of CVE-2023-42465</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1708427919" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1708427919" source="CLSA"/>
        <reference ref_id="CVE-2023-42465" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-42465" source="CVE"/>
        <description>- CVE-2023-42465: make sudo less vulnerable to ROWHAMMER attacks</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-02-20"/>
          <updated date="2024-02-20"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-42465" impact="important" public="20231222">CVE-2023-42465</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="sudo is earlier than 0:1.8.6p3-32.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1708427919001"/>
        <criteria operator="AND">
          <criterion comment="sudo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864003"/>
          <criterion comment="sudo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864004"/>
        </criteria>
        <criterion comment="sudo-devel is earlier than 0:1.8.6p3-32.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1708427919002"/>
        <criteria operator="AND">
          <criterion comment="sudo-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1611743864006"/>
          <criterion comment="sudo-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1611743864007"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1708639232" version="1">
      <metadata>
        <title>libxml2: Fix of CVE-2024-25062</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1708639232" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1708639232" source="CLSA"/>
        <reference ref_id="CVE-2024-25062" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-25062" source="CVE"/>
        <description>- CVE-2024-25062: Fix xmlValidatePopElement use-after-free in XML Reader
  interface with DTD validation and XInclude expansion enabled
- test suite was partially activated</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-02-22"/>
          <updated date="2024-02-22"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-25062" impact="important" public="20240204">CVE-2024-25062</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1708639232001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1708639232002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1708639232003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1708639232004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1709204660" version="1">
      <metadata>
        <title>kernel: Fix of 7 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1709204660" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1709204660" source="CLSA"/>
        <reference ref_id="CVE-2023-51043" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-51043" source="CVE"/>
        <reference ref_id="CVE-2023-6915" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-6915" source="CVE"/>
        <reference ref_id="CVE-2022-2588" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2588" source="CVE"/>
        <reference ref_id="CVE-2023-51780" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-51780" source="CVE"/>
        <reference ref_id="CVE-2021-4037" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4037" source="CVE"/>
        <reference ref_id="CVE-2022-33740" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-33740" source="CVE"/>
        <description>- KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653) {CVE-2021-3653}
- xen/netfront: fix leaking data in shared pages {CVE-2022-33740}
- xfs: fix up non-directory creation in SGID directories {CVE-2021-4037}
- net_sched: cls_route: remove from list when handle is 0 {CVE-2022-2588}
- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
- ida: Fix crash in ida_free when the bitmap is empty {CVE-2023-6915}
- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-51043}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-02-29"/>
          <updated date="2024-02-29"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-51043" impact="important" public="20240123">CVE-2023-51043</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2023-6915" impact="moderate" public="20240115">CVE-2023-6915</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2022-2588" impact="important" public="20240108">CVE-2022-2588</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-51780" impact="important" public="20240111">CVE-2023-51780</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-284" href="https://cve.tuxcare.com/els/cve/CVE-2021-4037" impact="important" public="20220824">CVE-2021-4037</cve>
          <cve cvss2="3.6/AV:L/AC:L/Au:N/C:P/I:N/A:P" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-212" href="https://cve.tuxcare.com/els/cve/CVE-2022-33740" impact="important" public="20220705">CVE-2022-33740</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1709204660001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1709204660008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1709563938" version="1">
      <metadata>
        <title>vim: Fix of CVE-2024-22667</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1709563938" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1709563938" source="CLSA"/>
        <reference ref_id="CVE-2024-22667" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-22667" source="CVE"/>
        <description>- CVE-2024-22667: addressing a potential stack-buffer-overflow in option
  processing functions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-03-04"/>
          <updated date="2024-03-04"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-22667" impact="important" public="20240205">CVE-2024-22667</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" test_ref="oval:com.tuxcare.clsa:tst:1709563938001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" test_ref="oval:com.tuxcare.clsa:tst:1709563938002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" test_ref="oval:com.tuxcare.clsa:tst:1709563938003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" test_ref="oval:com.tuxcare.clsa:tst:1709563938004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" test_ref="oval:com.tuxcare.clsa:tst:1709563938005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1710437162" version="1">
      <metadata>
        <title>bind: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1710437162" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1710437162" source="CLSA"/>
        <reference ref_id="CVE-2023-50868" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-50868" source="CVE"/>
        <reference ref_id="CVE-2023-50387" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-50387" source="CVE"/>
        <description>- CVE-2023-50387: Resolved CPU exhaustion from specially crafted DNSSEC-signed
  zone responses
- CVE-2023-50868: Resolved CPU exhaustion from DNSSEC-signed zones using NSEC3
- Enable internal tests by default</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-03-14"/>
          <updated date="2024-03-14"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2023-50868" impact="important" public="20240213">CVE-2023-50868</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2023-50387" impact="important" public="20240214">CVE-2023-50387</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1710437162001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1710437162002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1710437162003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1710437162004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1710437162005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1710437162006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1711491615" version="1">
      <metadata>
        <title>squid: Fix of CVE-2024-25617</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1711491615" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1711491615" source="CLSA"/>
        <reference ref_id="CVE-2024-25617" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-25617" source="CVE"/>
        <description>- CVE-2024-25617: Fix denial of service in HTTP header parser</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-03-26"/>
          <updated date="2024-03-26"/>
          <cve cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2024-25617" impact="important" public="20240214">CVE-2024-25617</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1711491615001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1712262573" version="1">
      <metadata>
        <title>unixODBC: Fix of CVE-2024-1013</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1712262573" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1712262573" source="CLSA"/>
        <reference ref_id="CVE-2024-1013" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-1013" source="CVE"/>
        <description>- CVE-2024-1013: Fix out-of-bounds stack write issue by adjusting callee write
  size from 8 to 4 bytes</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-04-04"/>
          <updated date="2024-04-04"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-823" href="https://cve.tuxcare.com/els/cve/CVE-2024-1013" impact="important" public="20240318">CVE-2024-1013</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="unixODBC is earlier than 0:2.2.14-14.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1712262573001"/>
        <criteria operator="AND">
          <criterion comment="unixODBC isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1712262573002"/>
          <criterion comment="unixODBC isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1712262573003"/>
        </criteria>
        <criterion comment="unixODBC-devel is earlier than 0:2.2.14-14.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1712262573004"/>
        <criteria operator="AND">
          <criterion comment="unixODBC-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1712262573005"/>
          <criterion comment="unixODBC-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1712262573006"/>
        </criteria>
        <criterion comment="unixODBC-kde is earlier than 0:2.2.14-14.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1712262573007"/>
        <criteria operator="AND">
          <criterion comment="unixODBC-kde isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1712262573008"/>
          <criterion comment="unixODBC-kde isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1712262573009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1713523278" version="1">
      <metadata>
        <title>less: Fix of CVE-2022-48624</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1713523278" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1713523278" source="CLSA"/>
        <reference ref_id="CVE-2022-48624" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48624" source="CVE"/>
        <description>- CVE-2022-48624: shell-quote filenames when invoking LESSCLOSE</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-04-19"/>
          <updated date="2024-04-19"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-77" href="https://cve.tuxcare.com/els/cve/CVE-2022-48624" impact="moderate" public="20240219">CVE-2022-48624</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="less is earlier than 0:436-13.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1713523278001"/>
        <criteria operator="AND">
          <criterion comment="less isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1713523278002"/>
          <criterion comment="less isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1713523278003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1715280966" version="1">
      <metadata>
        <title>php: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1715280966" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1715280966" source="CLSA"/>
        <reference ref_id="CVE-2024-2756" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-2756" source="CVE"/>
        <reference ref_id="CVE-2022-31629" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-31629" source="CVE"/>
        <description>- CVE-2022-31629: Add cookie integrity validation
- CVE-2024-2756:  Move cookie integrity validation downwards</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-05-09"/>
          <updated date="2024-05-09"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-2756" impact="moderate" public="20240412">CVE-2024-2756</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2022-31629" impact="moderate" public="20220928">CVE-2022-31629</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1715280966027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1715946466" version="1">
      <metadata>
        <title>less: Fix of CVE-2024-32487</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1715946466" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1715946466" source="CLSA"/>
        <reference ref_id="CVE-2024-32487" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-32487" source="CVE"/>
        <description>- CVE-2024-32487: filename.c: quoting mishandling</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-05-17"/>
          <updated date="2024-05-17"/>
          <cve cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cwe="CWE-78" href="https://cve.tuxcare.com/els/cve/CVE-2024-32487" impact="important" public="20240413">CVE-2024-32487</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="less is earlier than 0:436-13.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1715946466001"/>
        <criteria operator="AND">
          <criterion comment="less isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1713523278002"/>
          <criterion comment="less isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1713523278003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1716287930" version="1">
      <metadata>
        <title>ansible: Fix of CVE-2023-5764</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1716287930" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1716287930" source="CLSA"/>
        <reference ref_id="CVE-2023-5764" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-5764" source="CVE"/>
        <description>- CVE-2023-5764: avoid evaluate unsafe conditions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-05-21"/>
          <updated date="2024-05-21"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-5764" impact="important" public="20231212">CVE-2023-5764</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="ansible is earlier than 0:2.6.20-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1716287930001"/>
        <criteria operator="AND">
          <criterion comment="ansible isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1716287930002"/>
          <criterion comment="ansible isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1716287930003"/>
        </criteria>
        <criterion comment="ansible-doc is earlier than 0:2.6.20-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1716287930004"/>
        <criteria operator="AND">
          <criterion comment="ansible-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1716287930005"/>
          <criterion comment="ansible-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1716287930006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1717694505" version="1">
      <metadata>
        <title>glibc: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1717694505" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1717694505" source="CLSA"/>
        <reference ref_id="CVE-2018-11236" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-11236" source="CVE"/>
        <reference ref_id="CVE-2024-2961" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-2961" source="CVE"/>
        <description>- CVE-2018-11236: fix stack buffer overflow when realpath() input length is close
  to SSIZE_MAX.
- CVE-2024-2961: fix out-of-bound writes in ISO-2022-CN-EXT escape sequences</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-06-06"/>
          <updated date="2024-06-06"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-11236" impact="critical" public="20180518">CVE-2018-11236</cve>
          <cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-2961" impact="important" public="20240417">CVE-2024-2961</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1717694505007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1718901417" version="1">
      <metadata>
        <title>glibc: Fix of CVE-2024-33599</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1718901417" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1718901417" source="CLSA"/>
        <reference ref_id="CVE-2024-33599" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-33599" source="CVE"/>
        <description>- CVE-2024-33599: Fix buffer overflow in netgroup cache</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-06-20"/>
          <updated date="2024-06-20"/>
          <cve cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2024-33599" impact="important" public="20240423">CVE-2024-33599</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1718901417007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1724705338" version="1">
      <metadata>
        <title>bind: Fix of CVE-2024-1975</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1724705338" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1724705338" source="CLSA"/>
        <reference ref_id="CVE-2024-1975" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-1975" source="CVE"/>
        <description>- CVE-2024-1975: Remove support for SIG(0) message verification
- Fix tsiggss test</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-08-26"/>
          <updated date="2024-08-26"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2024-1975" impact="important" public="20240723">CVE-2024-1975</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1724705338001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1724705338002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1724705338003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1724705338004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1724705338005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1724705338006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1724774331" version="1">
      <metadata>
        <title>kernel: Fix of 11 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1724774331" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1724774331" source="CLSA"/>
        <reference ref_id="CVE-2024-26923" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-26923" source="CVE"/>
        <reference ref_id="CVE-2023-52340" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52340" source="CVE"/>
        <reference ref_id="CVE-2023-52752" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52752" source="CVE"/>
        <reference ref_id="CVE-2020-25643" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25643" source="CVE"/>
        <reference ref_id="CVE-2020-14351" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-14351" source="CVE"/>
        <reference ref_id="CVE-2020-11668" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-11668" source="CVE"/>
        <reference ref_id="CVE-2023-4921" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4921" source="CVE"/>
        <reference ref_id="CVE-2023-52445" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52445" source="CVE"/>
        <reference ref_id="CVE-2023-6270" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-6270" source="CVE"/>
        <reference ref_id="CVE-2024-36960" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-36960" source="CVE"/>
        <reference ref_id="CVE-2020-8648" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-8648" source="CVE"/>
        <description>- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960}
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923}
- ipv6: remove max_size check inline with ipv4 {CVE-2023-52340}
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2023-6270}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- hdlc_ppp: add range checks in ppp_cp_parse_cr() {CVE-2020-25643}
- perf/core: Fix race in the perf_mmap_close() function {CVE-2020-14351}
- media: xirlink_cit: add missing descriptor sanity checks {CVE-2020-11668}
- vt: selection, close sel_buffer race {CVE-2020-8648}
- net: sched: sch_qfq: Fix UAF in qfq_dequeue() {CVE-2023-4921}
- media: pvrusb2: fix use after free on context disconnection {CVE-2023-52445}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-08-27"/>
          <updated date="2024-08-27"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2024-26923" impact="important" public="20240424">CVE-2024-26923</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-52340" impact="important" public="20240705">CVE-2023-52340</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52752" impact="important" public="20240521">CVE-2023-52752</cve>
          <cve cvss2="7.5/AV:N/AC:M/Au:S/C:P/I:P/A:C" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-25643" impact="important" public="20201006">CVE-2020-25643</cve>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-14351" impact="important" public="20201203">CVE-2020-14351</cve>
          <cve cvss2="5.6/AV:L/AC:L/Au:N/C:N/I:P/A:C" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2020-11668" impact="important" public="20200409">CVE-2020-11668</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-4921" impact="important" public="20230912">CVE-2023-4921</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52445" impact="important" public="20240222">CVE-2023-52445</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-6270" impact="important" public="20240104">CVE-2023-6270</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-36960" impact="important" public="20240603">CVE-2024-36960</cve>
          <cve cvss2="3.6/AV:L/AC:L/Au:N/C:P/I:N/A:P" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-8648" impact="important" public="20200206">CVE-2020-8648</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1724774331001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331003"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331005"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331006"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331007"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1724774331008"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1725385588" version="1">
      <metadata>
        <title>clamav: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1725385588" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1725385588" source="CLSA"/>
        <reference ref_id="CVE-2023-20032" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-20032" source="CVE"/>
        <description>- Update to 0.103.11
- CVE-2023-20032: fix missing buffer size check that may result
  in a heap buffer overflow write
- Don't apply clamav-check.patch and CVE-2022-20698.patch as they have already
  been applied in new 0.103.11 version
- Don't apply clamav-clamonacc-service.patch since el6 doesn't have systemd
  and service file is useless</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-09-03"/>
          <updated date="2024-09-03"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-20032" impact="critical" public="20230301">CVE-2023-20032</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="clamav is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588001"/>
        <criteria operator="AND">
          <criterion comment="clamav isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588002"/>
          <criterion comment="clamav isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588003"/>
        </criteria>
        <criterion comment="clamav-data is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588004"/>
        <criteria operator="AND">
          <criterion comment="clamav-data isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588005"/>
          <criterion comment="clamav-data isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588006"/>
        </criteria>
        <criterion comment="clamav-devel is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588007"/>
        <criteria operator="AND">
          <criterion comment="clamav-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588008"/>
          <criterion comment="clamav-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588009"/>
        </criteria>
        <criterion comment="clamav-filesystem is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588010"/>
        <criteria operator="AND">
          <criterion comment="clamav-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588011"/>
          <criterion comment="clamav-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588012"/>
        </criteria>
        <criterion comment="clamav-lib is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588013"/>
        <criteria operator="AND">
          <criterion comment="clamav-lib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588014"/>
          <criterion comment="clamav-lib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588015"/>
        </criteria>
        <criterion comment="clamav-milter is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588016"/>
        <criteria operator="AND">
          <criterion comment="clamav-milter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588017"/>
          <criterion comment="clamav-milter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588018"/>
        </criteria>
        <criterion comment="clamav-update is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588019"/>
        <criteria operator="AND">
          <criterion comment="clamav-update isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588020"/>
          <criterion comment="clamav-update isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588021"/>
        </criteria>
        <criterion comment="clamd is earlier than 0:0.103.11-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1725385588022"/>
        <criteria operator="AND">
          <criterion comment="clamd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588023"/>
          <criterion comment="clamd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588024"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1725655852" version="1">
      <metadata>
        <title>git: Fix of CVE-2024-32004</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1725655852" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1725655852" source="CLSA"/>
        <reference ref_id="CVE-2024-32004" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-32004" source="CVE"/>
        <description>- CVE-2024-32004: integrating ownership checking to detect dubious local
  repositories during cloning</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-09-06"/>
          <updated date="2024-09-06"/>
          <cve cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cwe="CWE-114" href="https://cve.tuxcare.com/els/cve/CVE-2024-32004" impact="important" public="20240514">CVE-2024-32004</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852002"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852003"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852004"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852005"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852006"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852007"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852008"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852009"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852010"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852011"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1725655852012"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1725993966" version="1">
      <metadata>
        <title>expat: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1725993966" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1725993966" source="CLSA"/>
        <reference ref_id="CVE-2024-45491" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-45491" source="CVE"/>
        <reference ref_id="CVE-2024-45490" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-45490" source="CVE"/>
        <reference ref_id="CVE-2024-45492" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-45492" source="CVE"/>
        <description>- CVE-2024-45491: Detect integer overflow in dtdCopy on 32-bit platforms
- CVE-2024-45492: Detect integer overflow in nextScaffoldPart on 32-bit platforms</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-09-10"/>
          <updated date="2024-09-10"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2024-45491" impact="critical" public="20240830">CVE-2024-45491</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-611" href="https://cve.tuxcare.com/els/cve/CVE-2024-45490" impact="critical" public="20240830">CVE-2024-45490</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2024-45492" impact="critical" public="20240830">CVE-2024-45492</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1725993966001"/>
        <criteria operator="AND">
          <criterion comment="expat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248002"/>
          <criterion comment="expat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248003"/>
        </criteria>
        <criterion comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1725993966002"/>
        <criteria operator="AND">
          <criterion comment="expat-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248005"/>
          <criterion comment="expat-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1726059935" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 6 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1726059935" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1726059935" source="CLSA"/>
        <reference ref_id="CVE-2024-21140" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-21140" source="CVE"/>
        <reference ref_id="CVE-2024-21138" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-21138" source="CVE"/>
        <reference ref_id="CVE-2024-21145" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-21145" source="CVE"/>
        <reference ref_id="CVE-2024-21144" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-21144" source="CVE"/>
        <reference ref_id="CVE-2024-21131" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-21131" source="CVE"/>
        <reference ref_id="CVE-2024-21147" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-21147" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u422-b05. That fixes following CVEs:
- CVE-2024-21131: UTF8 size overflow
- CVE-2024-21138: Infinite loop vunlerability in SymbolTable
- CVE-2024-21140: Int overflow/underflow in Range Check Elimination (RCE)
- CVE-2024-21144: Invalid header validation leads to Pack200 excessive loading time
- CVE-2024-21145: Out-of-bounds access in MaskFill
- CVE-2024-21147: Out-of-bounds array index in Range Check Elimination (RCE)</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-09-11"/>
          <updated date="2024-09-11"/>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-200" href="https://cve.tuxcare.com/els/cve/CVE-2024-21140" impact="moderate" public="20240716">CVE-2024-21140</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2024-21138" impact="low" public="20240716">CVE-2024-21138</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-21145" impact="moderate" public="20240716">CVE-2024-21145</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2024-21144" impact="low" public="20240716">CVE-2024-21144</cve>
          <cve cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-21131" impact="low" public="20240716">CVE-2024-21131</cve>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-200" href="https://cve.tuxcare.com/els/cve/CVE-2024-21147" impact="important" public="20240716">CVE-2024-21147</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1726059935012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1726655093" version="1">
      <metadata>
        <title>kernel: Fix of 8 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1726655093" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1726655093" source="CLSA"/>
        <reference ref_id="CVE-2021-46936" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-46936" source="CVE"/>
        <reference ref_id="CVE-2024-36883" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-36883" source="CVE"/>
        <reference ref_id="CVE-2022-48791" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48791" source="CVE"/>
        <reference ref_id="CVE-2020-13974" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-13974" source="CVE"/>
        <reference ref_id="CVE-2020-25668" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25668" source="CVE"/>
        <reference ref_id="CVE-2020-27786" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-27786" source="CVE"/>
        <reference ref_id="CVE-2023-3611" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3611" source="CVE"/>
        <reference ref_id="CVE-2019-19768" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-19768" source="CVE"/>
        <description>- blktrace: fix dereference after null check {CVE-2019-19768}
- blktrace: Protect q-&gt;blk_trace with RCU {CVE-2019-19768}
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: Fix potential deadlock between delete &amp; sysfs ops
- net: fix out-of-bounds access in ops_init {CVE-2024-36883}
- net/sched: sch_qfq: account for stab overhead in qfq_enqueue {CVE-2023-3611}
- scsi: pm8001: Fix use-after-free for aborted TMF sas_task {CVE-2022-48791}
- net: fix use-after-free in tw_timer_handler {CVE-2021-46936}
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses {CVE-2020-27786}
- ALSA: rawmidi: Fix race at copying &amp; updating the position {CVE-2020-27786}
- tty: make FONTX ioctl use the tty pointer they were actually passed {CVE-2020-25668}
- vt: keyboard: avoid signed integer overflow in k_ascii {CVE-2020-13974}
- spec: make single build including noarch packages</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-09-18"/>
          <updated date="2024-09-18"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-46936" impact="important" public="20240227">CVE-2021-46936</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-36883" impact="important" public="20240530">CVE-2024-36883</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-48791" impact="important" public="20240716">CVE-2022-48791</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-13974" impact="important" public="20200609">CVE-2020-13974</cve>
          <cve cvss2="6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-662" href="https://cve.tuxcare.com/els/cve/CVE-2020-25668" impact="important" public="20210526">CVE-2020-25668</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-27786" impact="important" public="20201211">CVE-2020-27786</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-3611" impact="important" public="20230721">CVE-2023-3611</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2019-19768" impact="important" public="20191212">CVE-2019-19768</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1726655093001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1726655093011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1728071619" version="1">
      <metadata>
        <title>python: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1728071619" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1728071619" source="CLSA"/>
        <reference ref_id="CVE-2024-6232" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-6232" source="CVE"/>
        <reference ref_id="CVE-2024-7592" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-7592" source="CVE"/>
        <description>- CVE-2024-7592: fix algorithm with quadratic complexity to avoid using excess
  CPU resources while parsing the cookie value
- CVE-2024-6232: fix regular expressions that allowed excessive
  backtracking during tarfile.TarFile header parsing and was vulnerable to ReDoS
  via specifically-crafted tar archives</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-10-04"/>
          <updated date="2024-10-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els/cve/CVE-2024-6232" impact="important" public="20240903">CVE-2024-6232</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1333" href="https://cve.tuxcare.com/els/cve/CVE-2024-7592" impact="important" public="20240819">CVE-2024-7592</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1728071619001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1728071619002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1728071619003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1728071619004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1728071619005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1728071619006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1728297376" version="1">
      <metadata>
        <title>kernel: Fix of 13 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1728297376" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1728297376" source="CLSA"/>
        <reference ref_id="CVE-2024-44987" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-44987" source="CVE"/>
        <reference ref_id="CVE-2023-39197" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-39197" source="CVE"/>
        <reference ref_id="CVE-2021-47589" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47589" source="CVE"/>
        <reference ref_id="CVE-2024-43882" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-43882" source="CVE"/>
        <reference ref_id="CVE-2024-46673" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-46673" source="CVE"/>
        <reference ref_id="CVE-2021-47576" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47576" source="CVE"/>
        <reference ref_id="CVE-2024-46757" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-46757" source="CVE"/>
        <reference ref_id="CVE-2021-4439" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-4439" source="CVE"/>
        <reference ref_id="CVE-2022-48733" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48733" source="CVE"/>
        <reference ref_id="CVE-2024-41071" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-41071" source="CVE"/>
        <reference ref_id="CVE-2024-42301" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-42301" source="CVE"/>
        <reference ref_id="CVE-2024-42280" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-42280" source="CVE"/>
        <reference ref_id="CVE-2021-47600" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47600" source="CVE"/>
        <description>- btrfs: fix use-after-free after failure to create a snapshot {CVE-2022-48733}
- hwmon: (nct6775-core) Fix underflows seen when writing limit attributes {CVE-2024-46757}
- wifi: mac80211: Avoid address calculations via out of bounds array indexing {CVE-2024-41071}
- netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197}
- ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987}
- exec: Fix ToCToU between perm check and set-uid/gid usage {CVE-2024-43882}
- dm btree remove: fix use after free in rebalance_children() {CVE-2021-47600}
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound {CVE-2021-4439}
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() {CVE-2021-47576}
- igbvf: fix double free in `igbvf_probe` {CVE-2021-47589}
- mISDN: Fix a use after free in hfcmulti_tx() {CVE-2024-42280}
- dev/parport: fix the array out-of-bounds risk {CVE-2024-42301}
- scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-10-07"/>
          <updated date="2024-10-07"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-44987" impact="important" public="20240904">CVE-2024-44987</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-39197" impact="important" public="20240123">CVE-2023-39197</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2021-47589" impact="important" public="20240619">CVE-2021-47589</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-367" href="https://cve.tuxcare.com/els/cve/CVE-2024-43882" impact="important" public="20240821">CVE-2024-43882</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2024-46673" impact="important" public="20240913">CVE-2024-46673</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47576" impact="important" public="20240619">CVE-2021-47576</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-191" href="https://cve.tuxcare.com/els/cve/CVE-2024-46757" impact="important" public="20240918">CVE-2024-46757</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2021-4439" impact="important" public="20240620">CVE-2021-4439</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-48733" impact="important" public="20240620">CVE-2022-48733</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2024-41071" impact="important" public="20240729">CVE-2024-41071</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2024-42301" impact="important" public="20240817">CVE-2024-42301</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-42280" impact="important" public="20240817">CVE-2024-42280</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47600" impact="important" public="20240619">CVE-2021-47600</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1728297376001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" test_ref="oval:com.tuxcare.clsa:tst:1728297376011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1728582568" version="1">
      <metadata>
        <title>microcode_ctl: Fix of CVE-2023-31315</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1728582568" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1728582568" source="CLSA"/>
        <reference ref_id="CVE-2023-31315" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-31315" source="CVE"/>
        <description>- Update Intel CPU microcode to 20240813:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x35;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x433;
  - Addition of cpuid:A06A4/0xe6 microcode (in microcode.dat) at revision 0x1e;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4121;
  - Addition of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) at
    revision 0x4121;
  - Addition of cpuid:B06A8/0xe0 microcode (in microcode.dat) at revision
    0x4121;
  - Addition of cpuid:C06F1/0x87 microcode (in microcode.dat) at revision
    0x21000230;
  - Addition of cpuid:C06F2/0x87 microcode (in microcode.dat) at revision
    0x21000230;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x32;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x430;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x411c;
  - Update of cpuid:50653/0x97 (SKX-SP B1) microcode (in microcode.dat) from
    revision 0x1000181 up to 0x1000191;
  - Update of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) from
    revision 0x4003604 up to 0x4003605;
  - Update of cpuid:50657/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
    from revision 0x5003604 up to 0x5003707;
  - Update of cpuid:5065B/0xbf (CPX-SP A1) microcode (in microcode.dat) from
    revision 0x7002703 up to 0x7002904;
  - Update of cpuid:50665/0x10 (BDX-NS A0/A1, HWL A1) microcode (in
    microcode.dat) from revision 0xe000014 up to 0xe000015;
  - Update of cpuid:506F1/0x01 (DNV B0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3e;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003b9 up to 0xd0003e7;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x1000268 up to 0x10002b0;
  - Update of cpuid:706A1/0x01 (GLK B0) microcode (in microcode.dat) from
    revision 0x3e up to 0x42;
  - Update of cpuid:706A8/0x01 (GLK-R R0) microcode (in microcode.dat) from
    revision 0x22 up to 0x24;
  - Update of cpuid:706E5/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
    revision 0xc2 up to 0xc6;
  - Update of cpuid:806C1/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat)
    from revision 0xb4 up to 0xb8;
  - Update of cpuid:806C2/0xc2 (TGL-R C0) microcode (in microcode.dat) from
    revision 0x34 up to 0x38;
  - Update of cpuid:806D1/0xc2 (TGL-H R0) microcode (in microcode.dat) from
    revision 0x4e up to 0x52;
  - Update of cpuid:806E9/0x10 (AML-Y 2+2 H0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:806E9/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf6;
  - Update of cpuid:806EA/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf6;
  - Update of cpuid:806EB/0xd0 (WHL-U W0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:806EC/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in microcode.dat) from revision 0xf8 up to 0xfc;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:90661/0x01 (EHL B1) microcode (in microcode.dat) from
    revision 0x17 up to 0x1a;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x5 up to 0x7;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x430 up to 0x433;
  - Update of cpuid:906C0/0x01 (JSL A0/A1) microcode (in microcode.dat) from
    revision 0x24000024 up to 0x24000026;
  - Update of cpuid:906E9/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf8;
  - Update of cpuid:906EA/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
    from revision 0xf4 up to 0xf8;
  - Update of cpuid:906EB/0x02 (CFL-E/H/S B0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:906EC/0x22 (CFL-H/S/Xeon E P0) microcode (in microcode.dat)
    from revision 0xf4 up to 0xf8;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0xfa up to 0x100;
  - Update of cpuid:A0652/0x20 (CML-H R1) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfc;
  - Update of cpuid:A0653/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfa;
  - Update of cpuid:A0655/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfc;
  - Update of cpuid:A0660/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfe;
  - Update of cpuid:A0661/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfc;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x5d up to 0x62;
  - Update of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) from
    revision 0x11d up to 0x123;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x411c up to 0x4121;
  - Update of cpuid:B06E0/0x11 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x12 up to 0x17;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
- Update AMD CPU microcode to 2024-08-11 addresses CVE-2023-31315 (AMD-SB-7014):
  - Update AMD CPU microcode for processor family 0x19:
    cpuid:0x00A00F10(ver:0x0A00107A), cpuid:0x00A10F12(ver:0x0A101248),
    cpuid:0x00AA0F02(ver:0x0AA00215), cpuid:0x00A00F12(ver:0x0A001238),
    cpuid:0x00A10F11(ver:0x0A101148), cpuid:0x00A00F11(ver:0x0A0011D5);
  - Update AMD CPU microcode for processor family 0x17:
    cpuid:0x00800F12(ver:0x0800126F), cpuid:0x00830F10(ver:0x0830107C);</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-10-10"/>
          <updated date="2024-10-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-31315" impact="important" public="20240809">CVE-2023-31315</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="microcode_ctl is earlier than 3:1.17-33.42.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1728582568001"/>
        <criteria operator="AND">
          <criterion comment="microcode_ctl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262337002"/>
          <criterion comment="microcode_ctl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262337003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1729628500" version="1">
      <metadata>
        <title>php: Fix of CVE-2024-8927</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1729628500" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1729628500" source="CLSA"/>
        <reference ref_id="CVE-2024-8927" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-8927" source="CVE"/>
        <description>- CVE-2024-8927: Fix bypass of cgi.force_redirect configuration</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-10-22"/>
          <updated date="2024-10-22"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-8927" impact="important" public="20241008">CVE-2024-8927</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1729628500027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1730139582" version="1">
      <metadata>
        <title>php: Fix of CVE-2024-8925</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1730139582" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1730139582" source="CLSA"/>
        <reference ref_id="CVE-2024-8925" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-8925" source="CVE"/>
        <description>- CVE-2024-8925: Fix data integrity violation while parsing multipart/form-data
  boundaries larger than the read buffer</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-10-28"/>
          <updated date="2024-10-28"/>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2024-8925" impact="moderate" public="20241008">CVE-2024-8925</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1730139582027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1732198712" version="1">
      <metadata>
        <title>clamav: Fix of CVE-2024-20505</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1732198712" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1732198712" source="CLSA"/>
        <reference ref_id="CVE-2024-20505" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-20505" source="CVE"/>
        <description>- Update to 0.103.12
- CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF file
  parser that could cause a denial-of-service (DoS) condition</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-11-21"/>
          <updated date="2024-11-21"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-20505" impact="important" public="20240904">CVE-2024-20505</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="clamav is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712001"/>
        <criteria operator="AND">
          <criterion comment="clamav isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588002"/>
          <criterion comment="clamav isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588003"/>
        </criteria>
        <criterion comment="clamav-data is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712002"/>
        <criteria operator="AND">
          <criterion comment="clamav-data isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588005"/>
          <criterion comment="clamav-data isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588006"/>
        </criteria>
        <criterion comment="clamav-devel is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712003"/>
        <criteria operator="AND">
          <criterion comment="clamav-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588008"/>
          <criterion comment="clamav-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588009"/>
        </criteria>
        <criterion comment="clamav-filesystem is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712004"/>
        <criteria operator="AND">
          <criterion comment="clamav-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588011"/>
          <criterion comment="clamav-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588012"/>
        </criteria>
        <criterion comment="clamav-lib is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712005"/>
        <criteria operator="AND">
          <criterion comment="clamav-lib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588014"/>
          <criterion comment="clamav-lib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588015"/>
        </criteria>
        <criterion comment="clamav-milter is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712006"/>
        <criteria operator="AND">
          <criterion comment="clamav-milter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588017"/>
          <criterion comment="clamav-milter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588018"/>
        </criteria>
        <criterion comment="clamav-update is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712007"/>
        <criteria operator="AND">
          <criterion comment="clamav-update isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588020"/>
          <criterion comment="clamav-update isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588021"/>
        </criteria>
        <criterion comment="clamd is earlier than 0:0.103.12-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1732198712008"/>
        <criteria operator="AND">
          <criterion comment="clamd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1725385588023"/>
          <criterion comment="clamd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1725385588024"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1731956848" version="1">
      <metadata>
        <title>ImageMagick: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1731956848" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1731956848" source="CLSA"/>
        <reference ref_id="CVE-2020-27768" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-27768" source="CVE"/>
        <reference ref_id="CVE-2020-27751" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-27751" source="CVE"/>
        <reference ref_id="CVE-2020-27757" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-27757" source="CVE"/>
        <description>- CVE-2020-27751: fix shift exponent that is too large for 64-bit type at
  magick/quantum-export.c
- CVE-2020-27757: fix outside the range of representable values of type
  'unsigned long long' bug at magick/quantum-private.h
- CVE-2020-27768: fix outside the range of representable values of type
  'unsigned int' at magick/quantum-private.h</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-11-18"/>
          <updated date="2024-11-18"/>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-27768" impact="low" public="20210223">CVE-2020-27768</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-27751" impact="low" public="20201208">CVE-2020-27751</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-27757" impact="low" public="20201208">CVE-2020-27757</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="ImageMagick is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1731956848001"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265002"/>
          <criterion comment="ImageMagick isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265003"/>
        </criteria>
        <criterion comment="ImageMagick-c++ is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1731956848002"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-c++ isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265005"/>
          <criterion comment="ImageMagick-c++ isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265006"/>
        </criteria>
        <criterion comment="ImageMagick-c++-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1731956848003"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-c++-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265008"/>
          <criterion comment="ImageMagick-c++-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265009"/>
        </criteria>
        <criterion comment="ImageMagick-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1731956848004"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265011"/>
          <criterion comment="ImageMagick-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265012"/>
        </criteria>
        <criterion comment="ImageMagick-doc is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1731956848005"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265014"/>
          <criterion comment="ImageMagick-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265015"/>
        </criteria>
        <criterion comment="ImageMagick-perl is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1731956848006"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265017"/>
          <criterion comment="ImageMagick-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1732702350" version="1">
      <metadata>
        <title>squid: Fix of CVE-2024-45802</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1732702350" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1732702350" source="CLSA"/>
        <reference ref_id="CVE-2024-45802" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-45802" source="CVE"/>
        <description>- CVE-2024-45802: disable ESI</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-11-27"/>
          <updated date="2024-11-27"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-45802" impact="important" public="20241028">CVE-2024-45802</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1732702350001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1732702216" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2024-45802</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1732702216" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1732702216" source="CLSA"/>
        <reference ref_id="CVE-2024-45802" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-45802" source="CVE"/>
        <description>- CVE-2024-45802: disable ESI</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-11-27"/>
          <updated date="2024-11-27"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-45802" impact="important" public="20241028">CVE-2024-45802</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1732702216001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1733158910" version="1">
      <metadata>
        <title>kernel: Fix of 6 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1733158910" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1733158910" source="CLSA"/>
        <reference ref_id="CVE-2024-49967" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-49967" source="CVE"/>
        <reference ref_id="CVE-2022-49029" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49029" source="CVE"/>
        <reference ref_id="CVE-2024-46744" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-46744" source="CVE"/>
        <reference ref_id="CVE-2024-50035" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-50035" source="CVE"/>
        <reference ref_id="CVE-2022-1679" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-1679" source="CVE"/>
        <reference ref_id="CVE-2022-20368" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-20368" source="CVE"/>
        <description>- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails {CVE-2022-49029}
- ppp: fix ppp_async_encode() illegal access {CVE-2024-50035}
- ext4: no need to continue when the number of entries is 1 {CVE-2024-49967}
- net/packet: fix slab-out-of-bounds access in packet_recvmsg() {CVE-2022-20368}
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll {CVE-2022-20368}
- ath9k: fix use-after-free in ath9k_hif_usb_rx_cb {CVE-2022-1679}
- Squashfs: sanity check symbolic link size {CVE-2024-46744}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-12-02"/>
          <updated date="2024-12-02"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2024-49967" impact="important" public="20241021">CVE-2024-49967</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-49029" impact="important" public="20241021">CVE-2022-49029</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-59" href="https://cve.tuxcare.com/els/cve/CVE-2024-46744" impact="important" public="20240918">CVE-2024-46744</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-908" href="https://cve.tuxcare.com/els/cve/CVE-2024-50035" impact="important" public="20241021">CVE-2024-50035</cve>
          <cve cvss2="7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-1679" impact="important" public="20220516">CVE-2022-1679</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-20368" impact="important" public="20220811">CVE-2022-20368</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1733158910001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" test_ref="oval:com.tuxcare.clsa:tst:1733158910011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1733421975" version="1">
      <metadata>
        <title>php: Fix of CVE-2024-11233</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1733421975" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1733421975" source="CLSA"/>
        <reference ref_id="CVE-2024-11233" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-11233" source="CVE"/>
        <description>- CVE-2024-11233: fix single byte overread with convert.quoted-printable-decode filter</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-12-05"/>
          <updated date="2024-12-05"/>
          <cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2024-11233" impact="important" public="20241124">CVE-2024-11233</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1733421975027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1734039943" version="1">
      <metadata>
        <title>php: Fix of CVE-2024-11234</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1734039943" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1734039943" source="CLSA"/>
        <reference ref_id="CVE-2024-11234" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-11234" source="CVE"/>
        <description>- CVE-2024-11234: fix stream HTTP fulluri CRLF injection</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-12-12"/>
          <updated date="2024-12-12"/>
          <cve cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-11234" impact="important" public="20241124">CVE-2024-11234</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1734039943027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1735122554" version="1">
      <metadata>
        <title>ntp: Fix of CVE-2020-13817</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2024:1735122554" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2024:1735122554" source="CLSA"/>
        <reference ref_id="CVE-2020-13817" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-13817" source="CVE"/>
        <description>- CVE-2020-13817: randomize transmit timestamp in client requests</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2024-12-25"/>
          <updated date="2024-12-25"/>
          <cve cvss2="5.8/AV:N/AC:M/Au:N/C:N/I:P/A:P" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-330" href="https://cve.tuxcare.com/els/cve/CVE-2020-13817" impact="important" public="20200604">CVE-2020-13817</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="ntp is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1735122554001"/>
        <criteria operator="AND">
          <criterion comment="ntp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934002"/>
          <criterion comment="ntp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934003"/>
        </criteria>
        <criterion comment="ntp-doc is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1735122554002"/>
        <criteria operator="AND">
          <criterion comment="ntp-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934005"/>
          <criterion comment="ntp-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934006"/>
        </criteria>
        <criterion comment="ntp-perl is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1735122554003"/>
        <criteria operator="AND">
          <criterion comment="ntp-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934008"/>
          <criterion comment="ntp-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934009"/>
        </criteria>
        <criterion comment="ntpdate is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1735122554004"/>
        <criteria operator="AND">
          <criterion comment="ntpdate isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633442934011"/>
          <criterion comment="ntpdate isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633442934012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1737153996" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2024-25617</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1737153996" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1737153996" source="CLSA"/>
        <reference ref_id="CVE-2024-25617" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-25617" source="CVE"/>
        <description>- CVE-2024-25617: Improve handling of expanding HTTP header values to prevent DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-01-17"/>
          <updated date="2025-01-17"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-182" href="https://cve.tuxcare.com/els/cve/CVE-2024-25617" impact="important" public="20240214">CVE-2024-25617</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1737153996001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1739292069" version="1">
      <metadata>
        <title>kernel: Fix of 13 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1739292069" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1739292069" source="CLSA"/>
        <reference ref_id="CVE-2024-53104" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-53104" source="CVE"/>
        <reference ref_id="CVE-2023-52475" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52475" source="CVE"/>
        <reference ref_id="CVE-2021-47281" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47281" source="CVE"/>
        <reference ref_id="CVE-2024-27043" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-27043" source="CVE"/>
        <reference ref_id="CVE-2024-53227" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-53227" source="CVE"/>
        <reference ref_id="CVE-2024-56759" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56759" source="CVE"/>
        <reference ref_id="CVE-2024-53057" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-53057" source="CVE"/>
        <reference ref_id="CVE-2024-56604" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56604" source="CVE"/>
        <reference ref_id="CVE-2024-56603" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56603" source="CVE"/>
        <reference ref_id="CVE-2024-56650" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56650" source="CVE"/>
        <reference ref_id="CVE-2021-47191" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47191" source="CVE"/>
        <reference ref_id="CVE-2024-53142" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-53142" source="CVE"/>
        <reference ref_id="CVE-2024-35849" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-35849" source="CVE"/>
        <description>- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format {CVE-2024-53104}
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() {CVE-2024-35849}
- net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603}
- netfilter: x_tables: fix LED ID check in led_tg_check() {CVE-2024-56650}
- scsi: bfa: Fix use-after-free in bfad_im_module_exit() {CVE-2024-53227}
- ALSA: seq: Fix race of snd_seq_timer_open() {CVE-2021-47281}
- btrfs: fix use-after-free when COWing tree bock and tracing is enabled {CVE-2024-56759}
- Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604}
- initramfs: avoid filename buffer overrun {CVE-2024-53142}
- scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() {CVE-2021-47191}
- media: edia: dvbdev: fix a use-after-free {CVE-2024-27043}
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT {CVE-2024-53057}
- Input: powermate - fix use-after-free in powermate_config_complete {CVE-2023-52475}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-02-11"/>
          <updated date="2025-02-11"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-53104" impact="important" public="20241202">CVE-2024-53104</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52475" impact="important" public="20240229">CVE-2023-52475</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47281" impact="important" public="20240521">CVE-2021-47281</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-27043" impact="important" public="20240501">CVE-2024-27043</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-53227" impact="important" public="20241227">CVE-2024-53227</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-56759" impact="important" public="20250106">CVE-2024-56759</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-53057" impact="important" public="20241119">CVE-2024-53057</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-56604" impact="important" public="20241227">CVE-2024-56604</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-56603" impact="important" public="20241227">CVE-2024-56603</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-56650" impact="important" public="20241227">CVE-2024-56650</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47191" impact="important" public="20240410">CVE-2021-47191</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-53142" impact="important" public="20241206">CVE-2024-53142</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-908" href="https://cve.tuxcare.com/els/cve/CVE-2024-35849" impact="important" public="20240517">CVE-2024-35849</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1739292069001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" test_ref="oval:com.tuxcare.clsa:tst:1739292069011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1740823970" version="1">
      <metadata>
        <title>bind: Fix of CVE-2024-11187</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1740823970" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1740823970" source="CLSA"/>
        <reference ref_id="CVE-2024-11187" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-11187" source="CVE"/>
        <description>- CVE-2024-11187: Limit the additional processing for large RDATA sets</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-03-01"/>
          <updated date="2025-03-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-400" href="https://cve.tuxcare.com/els/cve/CVE-2024-11187" impact="important" public="20250129">CVE-2024-11187</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1740823970001"/>
        <criteria operator="AND">
          <criterion comment="bind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610002"/>
          <criterion comment="bind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610003"/>
        </criteria>
        <criterion comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1740823970002"/>
        <criteria operator="AND">
          <criterion comment="bind-chroot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610005"/>
          <criterion comment="bind-chroot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610006"/>
        </criteria>
        <criterion comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1740823970003"/>
        <criteria operator="AND">
          <criterion comment="bind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610008"/>
          <criterion comment="bind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610009"/>
        </criteria>
        <criterion comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1740823970004"/>
        <criteria operator="AND">
          <criterion comment="bind-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610011"/>
          <criterion comment="bind-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610012"/>
        </criteria>
        <criterion comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1740823970005"/>
        <criteria operator="AND">
          <criterion comment="bind-sdb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610014"/>
          <criterion comment="bind-sdb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610015"/>
        </criteria>
        <criterion comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1740823970006"/>
        <criteria operator="AND">
          <criterion comment="bind-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261610017"/>
          <criterion comment="bind-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261610018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1740656525" version="1">
      <metadata>
        <title>kernel: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1740656525" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1740656525" source="CLSA"/>
        <reference ref_id="CVE-2021-47334" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47334" source="CVE"/>
        <reference ref_id="CVE-2024-53150" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-53150" source="CVE"/>
        <reference ref_id="CVE-2024-53173" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-53173" source="CVE"/>
        <description>- NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173}
- ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150}
- misc/libmasm/module: Fix two use after free in ibmasm_init_one {CVE-2021-47334}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-02-27"/>
          <updated date="2025-02-27"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47334" impact="important" public="20240521">CVE-2021-47334</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-53150" impact="important" public="20241224">CVE-2024-53150</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-53173" impact="important" public="20241227">CVE-2024-53173</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1740656525001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" test_ref="oval:com.tuxcare.clsa:tst:1740656525011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1742232795" version="1">
      <metadata>
        <title>binutils: Fix of CVE-2025-0840</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1742232795" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1742232795" source="CLSA"/>
        <reference ref_id="CVE-2025-0840" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-0840" source="CVE"/>
        <description>- CVE-2025-0840: fix stack-buffer-overflow at objdump disassemble_bytes</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-03-17"/>
          <updated date="2025-03-17"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2025-0840" impact="important" public="20250129">CVE-2025-0840</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1742232795001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1742232795002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1741636522" version="1">
      <metadata>
        <title>libxml2: Fix of CVE-2025-27113</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1741636522" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1741636522" source="CLSA"/>
        <reference ref_id="CVE-2025-27113" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-27113" source="CVE"/>
        <description>- CVE-2025-27113: fix compilation of explicit child axis</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-03-10"/>
          <updated date="2025-03-10"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2025-27113" impact="important" public="20250218">CVE-2025-27113</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1741636522001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1741636522002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1741636522003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1741636522004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1747057793" version="1">
      <metadata>
        <title>libxml2: Fix of CVE-2025-32415</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1747057793" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1747057793" source="CLSA"/>
        <reference ref_id="CVE-2025-32414" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-32414" source="CVE"/>
        <reference ref_id="CVE-2025-32415" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-32415" source="CVE"/>
        <description>- CVE-2025-32415: fix heap buffer overflow in xmlSchemaIDCFillNodeTables</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-05-12"/>
          <updated date="2025-05-12"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-393" href="https://cve.tuxcare.com/els/cve/CVE-2025-32414" impact="important" public="20250408">CVE-2025-32414</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-1284" href="https://cve.tuxcare.com/els/cve/CVE-2025-32415" impact="important" public="20250417">CVE-2025-32415</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1747057793001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1747057793002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1747057793003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1747057793004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1748366748" version="1">
      <metadata>
        <title>kernel: Fix of 12 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1748366748" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1748366748" source="CLSA"/>
        <reference ref_id="CVE-2024-57850" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-57850" source="CVE"/>
        <reference ref_id="CVE-2024-50143" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-50143" source="CVE"/>
        <reference ref_id="CVE-2024-57980" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-57980" source="CVE"/>
        <reference ref_id="CVE-2022-48702" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48702" source="CVE"/>
        <reference ref_id="CVE-2025-37785" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37785" source="CVE"/>
        <reference ref_id="CVE-2025-21993" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-21993" source="CVE"/>
        <reference ref_id="CVE-2021-47636" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47636" source="CVE"/>
        <reference ref_id="CVE-2021-47219" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47219" source="CVE"/>
        <reference ref_id="CVE-2021-47277" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47277" source="CVE"/>
        <reference ref_id="CVE-2022-48701" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48701" source="CVE"/>
        <reference ref_id="CVE-2024-50234" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-50234" source="CVE"/>
        <reference ref_id="CVE-2022-49740" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49740" source="CVE"/>
        <description>- ext4: fix OOB read when checking dotdot dir {CVE-2025-37785}
- iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() {CVE-2025-21993}
- media: uvcvideo: Fix double free in error path {CVE-2024-57980}
- jffs2: Prevent rtime decompress memory corruption {CVE-2024-57850}
- wifi: iwlegacy: Clear stale interrupts before resuming device {CVE-2024-50234}
- udf: fix uninit-value use in udf_get_fileshortad {CVE-2024-50143}
- wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads {CVE-2022-49740}
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() {CVE-2021-47636}
- kvm: avoid speculation-based attacks from out-of-range memslot accesses {CVE-2021-47277}
- scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() {CVE-2021-47219}
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() {CVE-2022-48702}
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-05-27"/>
          <updated date="2025-05-27"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-57850" impact="important" public="20250111">CVE-2024-57850</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-908" href="https://cve.tuxcare.com/els/cve/CVE-2024-50143" impact="important" public="20241107">CVE-2024-50143</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2024-57980" impact="important" public="20250227">CVE-2024-57980</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2022-48702" impact="important" public="20240503">CVE-2022-48702</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-37785" impact="important" public="20250418">CVE-2025-37785</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-21993" impact="important" public="20250402">CVE-2025-21993</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47636" impact="important" public="20250226">CVE-2021-47636</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47219" impact="important" public="20240410">CVE-2021-47219</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47277" impact="important" public="20240521">CVE-2021-47277</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-48701" impact="important" public="20240503">CVE-2022-48701</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-367" href="https://cve.tuxcare.com/els/cve/CVE-2024-50234" impact="important" public="20241109">CVE-2024-50234</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-49740" impact="important" public="20250327">CVE-2022-49740</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1748366748001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" test_ref="oval:com.tuxcare.clsa:tst:1748366748011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1748947069" version="1">
      <metadata>
        <title>sssd: Fix of CVE-2023-3758</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1748947069" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1748947069" source="CLSA"/>
        <reference ref_id="CVE-2023-3758" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-3758" source="CVE"/>
        <description>- CVE-2023-3758: fix race condition in ad_gpo</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-06-03"/>
          <updated date="2025-06-03"/>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2023-3758" impact="important" public="20240416">CVE-2023-3758</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libipa_hbac is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069001"/>
        <criteria operator="AND">
          <criterion comment="libipa_hbac isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069002"/>
          <criterion comment="libipa_hbac isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069003"/>
        </criteria>
        <criterion comment="libipa_hbac-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069004"/>
        <criteria operator="AND">
          <criterion comment="libipa_hbac-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069005"/>
          <criterion comment="libipa_hbac-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069006"/>
        </criteria>
        <criterion comment="libsss_idmap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069007"/>
        <criteria operator="AND">
          <criterion comment="libsss_idmap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069008"/>
          <criterion comment="libsss_idmap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069009"/>
        </criteria>
        <criterion comment="libsss_idmap-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069010"/>
        <criteria operator="AND">
          <criterion comment="libsss_idmap-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069011"/>
          <criterion comment="libsss_idmap-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069012"/>
        </criteria>
        <criterion comment="libsss_nss_idmap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069013"/>
        <criteria operator="AND">
          <criterion comment="libsss_nss_idmap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069014"/>
          <criterion comment="libsss_nss_idmap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069015"/>
        </criteria>
        <criterion comment="libsss_nss_idmap-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069016"/>
        <criteria operator="AND">
          <criterion comment="libsss_nss_idmap-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069017"/>
          <criterion comment="libsss_nss_idmap-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069018"/>
        </criteria>
        <criterion comment="libsss_simpleifp is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069019"/>
        <criteria operator="AND">
          <criterion comment="libsss_simpleifp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069020"/>
          <criterion comment="libsss_simpleifp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069021"/>
        </criteria>
        <criterion comment="libsss_simpleifp-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069022"/>
        <criteria operator="AND">
          <criterion comment="libsss_simpleifp-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069023"/>
          <criterion comment="libsss_simpleifp-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069024"/>
        </criteria>
        <criterion comment="python-libipa_hbac is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069025"/>
        <criteria operator="AND">
          <criterion comment="python-libipa_hbac isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069026"/>
          <criterion comment="python-libipa_hbac isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069027"/>
        </criteria>
        <criterion comment="python-libsss_nss_idmap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069028"/>
        <criteria operator="AND">
          <criterion comment="python-libsss_nss_idmap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069029"/>
          <criterion comment="python-libsss_nss_idmap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069030"/>
        </criteria>
        <criterion comment="python-sss is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069031"/>
        <criteria operator="AND">
          <criterion comment="python-sss isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069032"/>
          <criterion comment="python-sss isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069033"/>
        </criteria>
        <criterion comment="python-sss-murmur is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069034"/>
        <criteria operator="AND">
          <criterion comment="python-sss-murmur isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069035"/>
          <criterion comment="python-sss-murmur isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069036"/>
        </criteria>
        <criterion comment="python-sssdconfig is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069037"/>
        <criteria operator="AND">
          <criterion comment="python-sssdconfig isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069038"/>
          <criterion comment="python-sssdconfig isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069039"/>
        </criteria>
        <criterion comment="sssd is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069040"/>
        <criteria operator="AND">
          <criterion comment="sssd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069041"/>
          <criterion comment="sssd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069042"/>
        </criteria>
        <criterion comment="sssd-ad is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069043"/>
        <criteria operator="AND">
          <criterion comment="sssd-ad isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069044"/>
          <criterion comment="sssd-ad isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069045"/>
        </criteria>
        <criterion comment="sssd-client is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069046"/>
        <criteria operator="AND">
          <criterion comment="sssd-client isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069047"/>
          <criterion comment="sssd-client isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069048"/>
        </criteria>
        <criterion comment="sssd-common is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069049"/>
        <criteria operator="AND">
          <criterion comment="sssd-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069050"/>
          <criterion comment="sssd-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069051"/>
        </criteria>
        <criterion comment="sssd-common-pac is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069052"/>
        <criteria operator="AND">
          <criterion comment="sssd-common-pac isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069053"/>
          <criterion comment="sssd-common-pac isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069054"/>
        </criteria>
        <criterion comment="sssd-dbus is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069055"/>
        <criteria operator="AND">
          <criterion comment="sssd-dbus isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069056"/>
          <criterion comment="sssd-dbus isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069057"/>
        </criteria>
        <criterion comment="sssd-ipa is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069058"/>
        <criteria operator="AND">
          <criterion comment="sssd-ipa isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069059"/>
          <criterion comment="sssd-ipa isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069060"/>
        </criteria>
        <criterion comment="sssd-krb5 is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069061"/>
        <criteria operator="AND">
          <criterion comment="sssd-krb5 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069062"/>
          <criterion comment="sssd-krb5 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069063"/>
        </criteria>
        <criterion comment="sssd-krb5-common is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069064"/>
        <criteria operator="AND">
          <criterion comment="sssd-krb5-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069065"/>
          <criterion comment="sssd-krb5-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069066"/>
        </criteria>
        <criterion comment="sssd-ldap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069067"/>
        <criteria operator="AND">
          <criterion comment="sssd-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069068"/>
          <criterion comment="sssd-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069069"/>
        </criteria>
        <criterion comment="sssd-proxy is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069070"/>
        <criteria operator="AND">
          <criterion comment="sssd-proxy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069071"/>
          <criterion comment="sssd-proxy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069072"/>
        </criteria>
        <criterion comment="sssd-tools is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1748947069073"/>
        <criteria operator="AND">
          <criterion comment="sssd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1748947069074"/>
          <criterion comment="sssd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1748947069075"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1750175787" version="1">
      <metadata>
        <title>kernel: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1750175787" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1750175787" source="CLSA"/>
        <reference ref_id="CVE-2022-49530" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49530" source="CVE"/>
        <reference ref_id="CVE-2022-49478" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49478" source="CVE"/>
        <reference ref_id="CVE-2021-47110" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47110" source="CVE"/>
        <reference ref_id="CVE-2022-49541" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49541" source="CVE"/>
        <description>- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init {CVE-2022-49478}
- x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110}
- cifs: fix potential double free during failed mount {CVE-2022-49541}
- drm/amd/pm: fix double free in si_parse_power_table() {CVE-2022-49530}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-06-17"/>
          <updated date="2025-06-17"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2022-49530" impact="important" public="20250226">CVE-2022-49530</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2022-49478" impact="important" public="20250226">CVE-2022-49478</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-459" href="https://cve.tuxcare.com/els/cve/CVE-2021-47110" impact="important" public="20240315">CVE-2021-47110</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2022-49541" impact="important" public="20250226">CVE-2022-49541</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1750175787001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" test_ref="oval:com.tuxcare.clsa:tst:1750175787011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1751134987" version="1">
      <metadata>
        <title>rsync: Fix of CVE-2024-12088</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1751134987" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1751134987" source="CLSA"/>
        <reference ref_id="CVE-2024-12088" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-12088" source="CVE"/>
        <description>- CVE-2024-12088: fix improper verification of symbolic link destinations to
  prevent path traversal vulnerability</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-06-28"/>
          <updated date="2025-06-28"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-35" href="https://cve.tuxcare.com/els/cve/CVE-2024-12088" impact="important" public="20250114">CVE-2024-12088</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1751134987001"/>
        <criteria operator="AND">
          <criterion comment="rsync isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653004535002"/>
          <criterion comment="rsync isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653004535003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1751612441" version="1">
      <metadata>
        <title>rsync: Fix of CVE-2024-12087</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1751612441" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1751612441" source="CLSA"/>
        <reference ref_id="CVE-2024-12087" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-12087" source="CVE"/>
        <description>- CVE-2024-12087: fix path traversal vulnerability by adding a proper symlink
  verification and deduplication checks on a per-file-list basis</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-04"/>
          <updated date="2025-07-04"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-35" href="https://cve.tuxcare.com/els/cve/CVE-2024-12087" impact="important" public="20250114">CVE-2024-12087</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1751612441001"/>
        <criteria operator="AND">
          <criterion comment="rsync isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1653004535002"/>
          <criterion comment="rsync isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1653004535003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1751612332" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1751612332" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1751612332" source="CLSA"/>
        <reference ref_id="CVE-2025-21587" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-21587" source="CVE"/>
        <reference ref_id="CVE-2025-30698" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-30698" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u452-b09. That fixes following CVE:
  CVE-2025-21587, CVE-2025-30698.</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-04"/>
          <updated date="2025-07-04"/>
          <cve cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-284" href="https://cve.tuxcare.com/els/cve/CVE-2025-21587" impact="important" public="20250415">CVE-2025-21587</cve>
          <cve cvss3="5.6000000000000005/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cwe="CWE-284" href="https://cve.tuxcare.com/els/cve/CVE-2025-30698" impact="moderate" public="20250415">CVE-2025-30698</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1751612332012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1752748974" version="1">
      <metadata>
        <title>git: Fix of CVE-2025-48384</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1752748974" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1752748974" source="CLSA"/>
        <reference ref_id="CVE-2025-48384" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-48384" source="CVE"/>
        <description>- CVE-2025-48384: config: quote values containing CR character</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-17"/>
          <updated date="2025-07-17"/>
          <cve cvss3="8.0/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-48384" impact="important" public="20250708">CVE-2025-48384</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974002"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974003"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974004"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974005"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974006"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974007"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974008"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974009"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974010"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974011"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1752748974012"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1753209595" version="1">
      <metadata>
        <title>perl: Fix of CVE-2018-18311</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1753209595" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1753209595" source="CLSA"/>
        <reference ref_id="CVE-2018-18311" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-18311" source="CVE"/>
        <description>- CVE-2018-18311: fix buffer overflow</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-22"/>
          <updated date="2025-07-22"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2018-18311" impact="critical" public="20181207">CVE-2018-18311</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="perl is earlier than 4:5.10.1-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595001"/>
        <criteria operator="AND">
          <criterion comment="perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005002"/>
          <criterion comment="perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005003"/>
        </criteria>
        <criterion comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595002"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Extract isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005005"/>
          <criterion comment="perl-Archive-Extract isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005006"/>
        </criteria>
        <criterion comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595003"/>
        <criteria operator="AND">
          <criterion comment="perl-Archive-Tar isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005008"/>
          <criterion comment="perl-Archive-Tar isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005009"/>
        </criteria>
        <criterion comment="perl-CGI is earlier than 0:3.51-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595004"/>
        <criteria operator="AND">
          <criterion comment="perl-CGI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005011"/>
          <criterion comment="perl-CGI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005012"/>
        </criteria>
        <criterion comment="perl-CPAN is earlier than 0:1.9402-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595005"/>
        <criteria operator="AND">
          <criterion comment="perl-CPAN isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005014"/>
          <criterion comment="perl-CPAN isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005015"/>
        </criteria>
        <criterion comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595006"/>
        <criteria operator="AND">
          <criterion comment="perl-CPANPLUS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005017"/>
          <criterion comment="perl-CPANPLUS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005018"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595007"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005020"/>
          <criterion comment="perl-Compress-Raw-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005021"/>
        </criteria>
        <criterion comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595008"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005023"/>
          <criterion comment="perl-Compress-Raw-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005024"/>
        </criteria>
        <criterion comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595009"/>
        <criteria operator="AND">
          <criterion comment="perl-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005026"/>
          <criterion comment="perl-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005027"/>
        </criteria>
        <criterion comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595010"/>
        <criteria operator="AND">
          <criterion comment="perl-Digest-SHA isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005029"/>
          <criterion comment="perl-Digest-SHA isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005030"/>
        </criteria>
        <criterion comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595011"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005032"/>
          <criterion comment="perl-ExtUtils-CBuilder isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005033"/>
        </criteria>
        <criterion comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595012"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-Embed isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005035"/>
          <criterion comment="perl-ExtUtils-Embed isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005036"/>
        </criteria>
        <criterion comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595013"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005038"/>
          <criterion comment="perl-ExtUtils-MakeMaker isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005039"/>
        </criteria>
        <criterion comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595014"/>
        <criteria operator="AND">
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005041"/>
          <criterion comment="perl-ExtUtils-ParseXS isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005042"/>
        </criteria>
        <criterion comment="perl-File-Fetch is earlier than 0:0.26-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595015"/>
        <criteria operator="AND">
          <criterion comment="perl-File-Fetch isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005044"/>
          <criterion comment="perl-File-Fetch isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005045"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595016"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Base isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005047"/>
          <criterion comment="perl-IO-Compress-Base isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005048"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595017"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005050"/>
          <criterion comment="perl-IO-Compress-Bzip2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005051"/>
        </criteria>
        <criterion comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595018"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Compress-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005053"/>
          <criterion comment="perl-IO-Compress-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005054"/>
        </criteria>
        <criterion comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595019"/>
        <criteria operator="AND">
          <criterion comment="perl-IO-Zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005056"/>
          <criterion comment="perl-IO-Zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005057"/>
        </criteria>
        <criterion comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595020"/>
        <criteria operator="AND">
          <criterion comment="perl-IPC-Cmd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005059"/>
          <criterion comment="perl-IPC-Cmd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005060"/>
        </criteria>
        <criterion comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595021"/>
        <criteria operator="AND">
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005062"/>
          <criterion comment="perl-Locale-Maketext-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005063"/>
        </criteria>
        <criterion comment="perl-Log-Message is earlier than 1:0.02-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595022"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005065"/>
          <criterion comment="perl-Log-Message isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005066"/>
        </criteria>
        <criterion comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595023"/>
        <criteria operator="AND">
          <criterion comment="perl-Log-Message-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005068"/>
          <criterion comment="perl-Log-Message-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005069"/>
        </criteria>
        <criterion comment="perl-Module-Build is earlier than 1:0.3500-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595024"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Build isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005071"/>
          <criterion comment="perl-Module-Build isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005072"/>
        </criteria>
        <criterion comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595025"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-CoreList isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005074"/>
          <criterion comment="perl-Module-CoreList isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005075"/>
        </criteria>
        <criterion comment="perl-Module-Load is earlier than 1:0.16-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595026"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005077"/>
          <criterion comment="perl-Module-Load isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005078"/>
        </criteria>
        <criterion comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595027"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Load-Conditional isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005080"/>
          <criterion comment="perl-Module-Load-Conditional isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005081"/>
        </criteria>
        <criterion comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595028"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Loaded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005083"/>
          <criterion comment="perl-Module-Loaded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005084"/>
        </criteria>
        <criterion comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595029"/>
        <criteria operator="AND">
          <criterion comment="perl-Module-Pluggable isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005086"/>
          <criterion comment="perl-Module-Pluggable isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005087"/>
        </criteria>
        <criterion comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595030"/>
        <criteria operator="AND">
          <criterion comment="perl-Object-Accessor isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005089"/>
          <criterion comment="perl-Object-Accessor isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005090"/>
        </criteria>
        <criterion comment="perl-Package-Constants is earlier than 1:0.02-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595031"/>
        <criteria operator="AND">
          <criterion comment="perl-Package-Constants isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005092"/>
          <criterion comment="perl-Package-Constants isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005093"/>
        </criteria>
        <criterion comment="perl-Params-Check is earlier than 1:0.26-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595032"/>
        <criteria operator="AND">
          <criterion comment="perl-Params-Check isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005095"/>
          <criterion comment="perl-Params-Check isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005096"/>
        </criteria>
        <criterion comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595033"/>
        <criteria operator="AND">
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005098"/>
          <criterion comment="perl-Parse-CPAN-Meta isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005099"/>
        </criteria>
        <criterion comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595034"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Escapes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005101"/>
          <criterion comment="perl-Pod-Escapes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005102"/>
        </criteria>
        <criterion comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595035"/>
        <criteria operator="AND">
          <criterion comment="perl-Pod-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005104"/>
          <criterion comment="perl-Pod-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005105"/>
        </criteria>
        <criterion comment="perl-Term-UI is earlier than 0:0.20-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595036"/>
        <criteria operator="AND">
          <criterion comment="perl-Term-UI isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005107"/>
          <criterion comment="perl-Term-UI isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005108"/>
        </criteria>
        <criterion comment="perl-Test-Harness is earlier than 0:3.17-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595037"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Harness isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005110"/>
          <criterion comment="perl-Test-Harness isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005111"/>
        </criteria>
        <criterion comment="perl-Test-Simple is earlier than 0:0.92-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595038"/>
        <criteria operator="AND">
          <criterion comment="perl-Test-Simple isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005113"/>
          <criterion comment="perl-Test-Simple isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005114"/>
        </criteria>
        <criterion comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595039"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-HiRes isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005116"/>
          <criterion comment="perl-Time-HiRes isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005117"/>
        </criteria>
        <criterion comment="perl-Time-Piece is earlier than 0:1.15-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595040"/>
        <criteria operator="AND">
          <criterion comment="perl-Time-Piece isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005119"/>
          <criterion comment="perl-Time-Piece isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005120"/>
        </criteria>
        <criterion comment="perl-core is earlier than 0:5.10.1-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595041"/>
        <criteria operator="AND">
          <criterion comment="perl-core isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005122"/>
          <criterion comment="perl-core isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005123"/>
        </criteria>
        <criterion comment="perl-devel is earlier than 4:5.10.1-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595042"/>
        <criteria operator="AND">
          <criterion comment="perl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005125"/>
          <criterion comment="perl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005126"/>
        </criteria>
        <criterion comment="perl-libs is earlier than 4:5.10.1-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595043"/>
        <criteria operator="AND">
          <criterion comment="perl-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005128"/>
          <criterion comment="perl-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005129"/>
        </criteria>
        <criterion comment="perl-parent is earlier than 1:0.221-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595044"/>
        <criteria operator="AND">
          <criterion comment="perl-parent isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005131"/>
          <criterion comment="perl-parent isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005132"/>
        </criteria>
        <criterion comment="perl-suidperl is earlier than 4:5.10.1-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595045"/>
        <criteria operator="AND">
          <criterion comment="perl-suidperl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005134"/>
          <criterion comment="perl-suidperl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005135"/>
        </criteria>
        <criterion comment="perl-version is earlier than 3:0.77-146.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1753209595046"/>
        <criteria operator="AND">
          <criterion comment="perl-version isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1657561005137"/>
          <criterion comment="perl-version isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1657561005138"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1753377886" version="1">
      <metadata>
        <title>libxml2: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1753377886" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1753377886" source="CLSA"/>
        <reference ref_id="CVE-2025-49794" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-49794" source="CVE"/>
        <reference ref_id="CVE-2025-49796" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-49796" source="CVE"/>
        <description>- CVE-2025-49794: fix memory safety issues in xmlSchematronReportOutput when parsing
  XPath elements
- CVE-2025-49796: fix memory corruption issue triggered by processing sch:name
  elements in input XML file</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-24"/>
          <updated date="2025-07-24"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-825" href="https://cve.tuxcare.com/els/cve/CVE-2025-49794" impact="important" public="20250610">CVE-2025-49794</cve>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-49796" impact="important" public="20250611">CVE-2025-49796</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1753377886001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1753377886002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1753377886003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1753377886004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1753780501" version="1">
      <metadata>
        <title>php: Fix of CVE-2025-1220</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1753780501" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1753780501" source="CLSA"/>
        <reference ref_id="CVE-2025-6491" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-6491" source="CVE"/>
        <reference ref_id="CVE-2025-1220" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-1220" source="CVE"/>
        <description>- CVE-2025-1220: fix null byte termination in hostnames</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-07-29"/>
          <updated date="2025-07-29"/>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2025-6491" impact="moderate" public="20250705">CVE-2025-6491</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cwe="CWE-918" href="https://cve.tuxcare.com/els/cve/CVE-2025-1220" impact="moderate" public="20250713">CVE-2025-1220</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1753780501027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1754342507" version="1">
      <metadata>
        <title>sqlite: Fix of CVE-2025-6965</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1754342507" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1754342507" source="CLSA"/>
        <reference ref_id="CVE-2025-6965" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-6965" source="CVE"/>
        <description>- CVE-2025-6965: fix a potential memory corruption if the number
  of aggregate terms in a query exceeds the maximum number of columns</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-04"/>
          <updated date="2025-08-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-197" href="https://cve.tuxcare.com/els/cve/CVE-2025-6965" impact="critical" public="20250715">CVE-2025-6965</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="lemon is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1754342507001"/>
        <criteria operator="AND">
          <criterion comment="lemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177002"/>
          <criterion comment="lemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177003"/>
        </criteria>
        <criterion comment="sqlite is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1754342507002"/>
        <criteria operator="AND">
          <criterion comment="sqlite isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177005"/>
          <criterion comment="sqlite isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177006"/>
        </criteria>
        <criterion comment="sqlite-devel is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1754342507003"/>
        <criteria operator="AND">
          <criterion comment="sqlite-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177008"/>
          <criterion comment="sqlite-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177009"/>
        </criteria>
        <criterion comment="sqlite-doc is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1754342507004"/>
        <criteria operator="AND">
          <criterion comment="sqlite-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177011"/>
          <criterion comment="sqlite-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177012"/>
        </criteria>
        <criterion comment="sqlite-tcl is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1754342507005"/>
        <criteria operator="AND">
          <criterion comment="sqlite-tcl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1665428177014"/>
          <criterion comment="sqlite-tcl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1665428177015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1754381382" version="1">
      <metadata>
        <title>git: Fix of CVE-2025-27613</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1754381382" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1754381382" source="CLSA"/>
        <reference ref_id="CVE-2025-27613" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-27613" source="CVE"/>
        <description>- CVE-2025-27613: fix vulnerability where Gitk can write and truncate
  arbitrary writable files</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-05"/>
          <updated date="2025-08-05"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-73" href="https://cve.tuxcare.com/els/cve/CVE-2025-27613" impact="moderate" public="20250708">CVE-2025-27613</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382002"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382003"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382004"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382005"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382006"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382007"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382008"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382009"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382010"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382011"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1754381382012"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1755074145" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1755074145" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1755074145" source="CLSA"/>
        <reference ref_id="CVE-2025-30749" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-30749" source="CVE"/>
        <reference ref_id="CVE-2025-30761" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-30761" source="CVE"/>
        <reference ref_id="CVE-2025-30754" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-30754" source="CVE"/>
        <reference ref_id="CVE-2025-50106" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-50106" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u462-b08. That fixes following CVEs:
- CVE-2025-30749: better Glyph drawing
- CVE-2025-30754: enhance TLS protocol support
- CVE-2025-30761: improve scripting supports
- CVE-2025-50106: glyph out-of-memory access and crash</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-13"/>
          <updated date="2025-08-13"/>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-30749" impact="important" public="20250715">CVE-2025-30749</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2025-30761" impact="moderate" public="20250715">CVE-2025-30761</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-325" href="https://cve.tuxcare.com/els/cve/CVE-2025-30754" impact="moderate" public="20250715">CVE-2025-30754</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-50106" impact="important" public="20250715">CVE-2025-50106</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074145012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1755074254" version="1">
      <metadata>
        <title>subversion: Fix of CVE-2024-46901</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1755074254" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1755074254" source="CLSA"/>
        <reference ref_id="CVE-2024-46901" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-46901" source="CVE"/>
        <description>- CVE-2024-46901: fix mod_dav_svn denial-of-service via control characters in paths</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-13"/>
          <updated date="2025-08-13"/>
          <cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2024-46901" impact="moderate" public="20241209">CVE-2024-46901</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="mod_dav_svn is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254001"/>
        <criteria operator="AND">
          <criterion comment="mod_dav_svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254002"/>
          <criterion comment="mod_dav_svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254003"/>
        </criteria>
        <criterion comment="subversion is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254004"/>
        <criteria operator="AND">
          <criterion comment="subversion isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254005"/>
          <criterion comment="subversion isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254006"/>
        </criteria>
        <criterion comment="subversion-devel is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254007"/>
        <criteria operator="AND">
          <criterion comment="subversion-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254008"/>
          <criterion comment="subversion-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254009"/>
        </criteria>
        <criterion comment="subversion-gnome is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254010"/>
        <criteria operator="AND">
          <criterion comment="subversion-gnome isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254011"/>
          <criterion comment="subversion-gnome isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254012"/>
        </criteria>
        <criterion comment="subversion-javahl is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254013"/>
        <criteria operator="AND">
          <criterion comment="subversion-javahl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254014"/>
          <criterion comment="subversion-javahl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254015"/>
        </criteria>
        <criterion comment="subversion-kde is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254016"/>
        <criteria operator="AND">
          <criterion comment="subversion-kde isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254017"/>
          <criterion comment="subversion-kde isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254018"/>
        </criteria>
        <criterion comment="subversion-perl is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254019"/>
        <criteria operator="AND">
          <criterion comment="subversion-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254020"/>
          <criterion comment="subversion-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254021"/>
        </criteria>
        <criterion comment="subversion-ruby is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254022"/>
        <criteria operator="AND">
          <criterion comment="subversion-ruby isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254023"/>
          <criterion comment="subversion-ruby isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254024"/>
        </criteria>
        <criterion comment="subversion-svn2cl is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755074254025"/>
        <criteria operator="AND">
          <criterion comment="subversion-svn2cl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755074254026"/>
          <criterion comment="subversion-svn2cl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755074254027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1755184971" version="1">
      <metadata>
        <title>git: Fix of CVE-2025-46835</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1755184971" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1755184971" source="CLSA"/>
        <reference ref_id="CVE-2025-46835" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-46835" source="CVE"/>
        <description>- CVE-2025-46835: fix vulnerability where Git GUI can create and overwrite
  arbitrary writable files</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-14"/>
          <updated date="2025-08-14"/>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cwe="CWE-88" href="https://cve.tuxcare.com/els/cve/CVE-2025-46835" impact="low" public="20250710">CVE-2025-46835</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971002"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971003"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971004"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971005"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971006"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971007"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971008"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971009"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971010"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971011"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1755184971012"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1755707175" version="1">
      <metadata>
        <title>kernel: Fix of CVE-2023-52572</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1755707175" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1755707175" source="CLSA"/>
        <reference ref_id="CVE-2023-52572" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52572" source="CVE"/>
        <description>- cifs: Fix UAF in cifs_demultiplex_thread() {CVE-2023-52572}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-20"/>
          <updated date="2025-08-20"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52572" impact="important" public="20240302">CVE-2023-52572</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1755707175001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" test_ref="oval:com.tuxcare.clsa:tst:1755707175011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1755513827" version="1">
      <metadata>
        <title>tomcat6: Fix of CVE-2025-24813</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1755513827" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1755513827" source="CLSA"/>
        <reference ref_id="CVE-2025-24813" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-24813" source="CVE"/>
        <description>- CVE-2025-24813: enhance lifecycle of temporary files used by partial PUT</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-18"/>
          <updated date="2025-08-18"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-44" href="https://cve.tuxcare.com/els/cve/CVE-2025-24813" impact="critical" public="20250310">CVE-2025-24813</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="tomcat6 is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827001"/>
        <criteria operator="AND">
          <criterion comment="tomcat6 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827002"/>
          <criterion comment="tomcat6 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827003"/>
        </criteria>
        <criterion comment="tomcat6-admin-webapps is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827004"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-admin-webapps isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827005"/>
          <criterion comment="tomcat6-admin-webapps isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827006"/>
        </criteria>
        <criterion comment="tomcat6-docs-webapp is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827007"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-docs-webapp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827008"/>
          <criterion comment="tomcat6-docs-webapp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827009"/>
        </criteria>
        <criterion comment="tomcat6-el-2.1-api is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827010"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-el-2.1-api isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827011"/>
          <criterion comment="tomcat6-el-2.1-api isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827012"/>
        </criteria>
        <criterion comment="tomcat6-javadoc is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827013"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827014"/>
          <criterion comment="tomcat6-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827015"/>
        </criteria>
        <criterion comment="tomcat6-jsp-2.1-api is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827016"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-jsp-2.1-api isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827017"/>
          <criterion comment="tomcat6-jsp-2.1-api isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827018"/>
        </criteria>
        <criterion comment="tomcat6-lib is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827019"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-lib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827020"/>
          <criterion comment="tomcat6-lib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827021"/>
        </criteria>
        <criterion comment="tomcat6-servlet-2.5-api is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827022"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-servlet-2.5-api isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827023"/>
          <criterion comment="tomcat6-servlet-2.5-api isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827024"/>
        </criteria>
        <criterion comment="tomcat6-webapps is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755513827025"/>
        <criteria operator="AND">
          <criterion comment="tomcat6-webapps isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755513827026"/>
          <criterion comment="tomcat6-webapps isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755513827027"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1755271747" version="1">
      <metadata>
        <title>dmidecode: Fix of CVE-2023-30630</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1755271747" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1755271747" source="CLSA"/>
        <reference ref_id="CVE-2023-30630" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-30630" source="CVE"/>
        <description>- CVE-2023-30630: prevent --dump-bin from overwriting local files to
  address privilege escalation vulnerability</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-15"/>
          <updated date="2025-08-15"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-30630" impact="important" public="20230413">CVE-2023-30630</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="dmidecode is earlier than 1:2.12-7.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1755271747001"/>
        <criteria operator="AND">
          <criterion comment="dmidecode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1755271747002"/>
          <criterion comment="dmidecode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1755271747003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1756409922" version="1">
      <metadata>
        <title>wget: Fix of CVE-2024-38428</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1756409922" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1756409922" source="CLSA"/>
        <reference ref_id="CVE-2024-38428" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-38428" source="CVE"/>
        <description>- CVE-2024-38428: fix mishandle semicolons in userinfo subcomponent of URI to
  prevent insecure behavior</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-28"/>
          <updated date="2025-08-28"/>
          <cve cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-436" href="https://cve.tuxcare.com/els/cve/CVE-2024-38428" impact="critical" public="20240616">CVE-2024-38428</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="wget is earlier than 0:1.12-10.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1756409922001"/>
        <criteria operator="AND">
          <criterion comment="wget isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1756409922002"/>
          <criterion comment="wget isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1756409922003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1756483990" version="1">
      <metadata>
        <title>php: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1756483990" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1756483990" source="CLSA"/>
        <reference ref_id="CVE-2025-1217" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-1217" source="CVE"/>
        <reference ref_id="CVE-2025-1734" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-1734" source="CVE"/>
        <reference ref_id="CVE-2025-1861" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-1861" source="CVE"/>
        <description>- CVE-2025-1217: http stream wrapper: fix handling folded headers
- CVE-2025-1734: http stream wrapper: fix handling headers with invalid name and no colon
- CVE-2025-1861: fix http redirect location truncation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-08-29"/>
          <updated date="2025-08-29"/>
          <cve cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2025-1217" impact="low" public="20250329">CVE-2025-1217</cve>
          <cve cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2025-1734" impact="moderate" public="20250330">CVE-2025-1734</cve>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-131" href="https://cve.tuxcare.com/els/cve/CVE-2025-1861" impact="critical" public="20250330">CVE-2025-1861</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990001"/>
        <criteria operator="AND">
          <criterion comment="php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193002"/>
          <criterion comment="php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193003"/>
        </criteria>
        <criterion comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990002"/>
        <criteria operator="AND">
          <criterion comment="php-bcmath isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193005"/>
          <criterion comment="php-bcmath isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193006"/>
        </criteria>
        <criterion comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990003"/>
        <criteria operator="AND">
          <criterion comment="php-cli isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193008"/>
          <criterion comment="php-cli isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193009"/>
        </criteria>
        <criterion comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990004"/>
        <criteria operator="AND">
          <criterion comment="php-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193011"/>
          <criterion comment="php-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193012"/>
        </criteria>
        <criterion comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990005"/>
        <criteria operator="AND">
          <criterion comment="php-dba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193014"/>
          <criterion comment="php-dba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193015"/>
        </criteria>
        <criterion comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990006"/>
        <criteria operator="AND">
          <criterion comment="php-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193017"/>
          <criterion comment="php-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193018"/>
        </criteria>
        <criterion comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990007"/>
        <criteria operator="AND">
          <criterion comment="php-embedded isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193020"/>
          <criterion comment="php-embedded isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193021"/>
        </criteria>
        <criterion comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990008"/>
        <criteria operator="AND">
          <criterion comment="php-enchant isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193023"/>
          <criterion comment="php-enchant isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193024"/>
        </criteria>
        <criterion comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990009"/>
        <criteria operator="AND">
          <criterion comment="php-fpm isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193026"/>
          <criterion comment="php-fpm isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193027"/>
        </criteria>
        <criterion comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990010"/>
        <criteria operator="AND">
          <criterion comment="php-gd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193029"/>
          <criterion comment="php-gd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193030"/>
        </criteria>
        <criterion comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990011"/>
        <criteria operator="AND">
          <criterion comment="php-imap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193032"/>
          <criterion comment="php-imap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193033"/>
        </criteria>
        <criterion comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990012"/>
        <criteria operator="AND">
          <criterion comment="php-intl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193035"/>
          <criterion comment="php-intl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193036"/>
        </criteria>
        <criterion comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990013"/>
        <criteria operator="AND">
          <criterion comment="php-ldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193038"/>
          <criterion comment="php-ldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193039"/>
        </criteria>
        <criterion comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990014"/>
        <criteria operator="AND">
          <criterion comment="php-mbstring isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193041"/>
          <criterion comment="php-mbstring isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193042"/>
        </criteria>
        <criterion comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990015"/>
        <criteria operator="AND">
          <criterion comment="php-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193044"/>
          <criterion comment="php-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193045"/>
        </criteria>
        <criterion comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990016"/>
        <criteria operator="AND">
          <criterion comment="php-odbc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193047"/>
          <criterion comment="php-odbc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193048"/>
        </criteria>
        <criterion comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990017"/>
        <criteria operator="AND">
          <criterion comment="php-pdo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193050"/>
          <criterion comment="php-pdo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193051"/>
        </criteria>
        <criterion comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990018"/>
        <criteria operator="AND">
          <criterion comment="php-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193053"/>
          <criterion comment="php-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193054"/>
        </criteria>
        <criterion comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990019"/>
        <criteria operator="AND">
          <criterion comment="php-process isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193056"/>
          <criterion comment="php-process isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193057"/>
        </criteria>
        <criterion comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990020"/>
        <criteria operator="AND">
          <criterion comment="php-pspell isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193059"/>
          <criterion comment="php-pspell isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193060"/>
        </criteria>
        <criterion comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990021"/>
        <criteria operator="AND">
          <criterion comment="php-recode isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193062"/>
          <criterion comment="php-recode isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193063"/>
        </criteria>
        <criterion comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990022"/>
        <criteria operator="AND">
          <criterion comment="php-snmp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193065"/>
          <criterion comment="php-snmp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193066"/>
        </criteria>
        <criterion comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990023"/>
        <criteria operator="AND">
          <criterion comment="php-soap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193068"/>
          <criterion comment="php-soap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193069"/>
        </criteria>
        <criterion comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990024"/>
        <criteria operator="AND">
          <criterion comment="php-tidy isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193071"/>
          <criterion comment="php-tidy isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193072"/>
        </criteria>
        <criterion comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990025"/>
        <criteria operator="AND">
          <criterion comment="php-xml isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193074"/>
          <criterion comment="php-xml isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193075"/>
        </criteria>
        <criterion comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990026"/>
        <criteria operator="AND">
          <criterion comment="php-xmlrpc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193077"/>
          <criterion comment="php-xmlrpc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193078"/>
        </criteria>
        <criterion comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1756483990027"/>
        <criteria operator="AND">
          <criterion comment="php-zts isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1637673193080"/>
          <criterion comment="php-zts isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1637673193081"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1757016520" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2025-54574</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1757016520" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1757016520" source="CLSA"/>
        <reference ref_id="CVE-2025-54574" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-54574" source="CVE"/>
        <description>- CVE-2025-54574: fix buffer overflow in URN handling</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-04"/>
          <updated date="2025-09-04"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2025-54574" impact="critical" public="20250801">CVE-2025-54574</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757016520001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1757076484" version="1">
      <metadata>
        <title>squid: Fix of CVE-2025-54574</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1757076484" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1757076484" source="CLSA"/>
        <reference ref_id="CVE-2025-54574" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-54574" source="CVE"/>
        <description>- CVE-2025-54574: fix buffer overflow in URN handling</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-05"/>
          <updated date="2025-09-05"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2025-54574" impact="critical" public="20250801">CVE-2025-54574</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els14" test_ref="oval:com.tuxcare.clsa:tst:1757076484001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1757608775" version="1">
      <metadata>
        <title>python: Fix of CVE-2016-5636</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1757608775" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1757608775" source="CLSA"/>
        <reference ref_id="CVE-2016-5636" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-5636" source="CVE"/>
        <description>- CVE-2016-5636: fix heap-based buffer overflow in zipimport.c</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-11"/>
          <updated date="2025-09-11"/>
          <cve cvss2="10.0/AV:N/AC:L/Au:N/C:C/I:C/A:C" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2016-5636" impact="critical" public="20160902">CVE-2016-5636</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1757608775001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1757608775002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1757608775003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1757608775004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1757608775005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1757608775006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758035415" version="1">
      <metadata>
        <title>httpd: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758035415" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758035415" source="CLSA"/>
        <reference ref_id="CVE-2025-49812" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-49812" source="CVE"/>
        <reference ref_id="CVE-2024-47252" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-47252" source="CVE"/>
        <description>- CVE-2024-47252: escape characters are now properly handled in mod_ssl to
  prevent untrusted SSL/TLS clients from inserting escape characters into log
  files
- CVE-2025-49812: remove support for TLS upgrade to mitigate HTTP
  desynchronisation attack</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-16"/>
          <updated date="2025-09-16"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-49812" impact="important" public="20250714">CVE-2025-49812</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-117" href="https://cve.tuxcare.com/els/cve/CVE-2024-47252" impact="important" public="20250714">CVE-2024-47252</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1758035415001"/>
        <criteria operator="AND">
          <criterion comment="httpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543002"/>
          <criterion comment="httpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543003"/>
        </criteria>
        <criterion comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1758035415002"/>
        <criteria operator="AND">
          <criterion comment="httpd-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543005"/>
          <criterion comment="httpd-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543006"/>
        </criteria>
        <criterion comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1758035415003"/>
        <criteria operator="AND">
          <criterion comment="httpd-manual isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543008"/>
          <criterion comment="httpd-manual isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543009"/>
        </criteria>
        <criterion comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1758035415004"/>
        <criteria operator="AND">
          <criterion comment="httpd-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543011"/>
          <criterion comment="httpd-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543012"/>
        </criteria>
        <criterion comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1758035415005"/>
        <criteria operator="AND">
          <criterion comment="mod_ssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1633601543014"/>
          <criterion comment="mod_ssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1633601543015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1757700075" version="1">
      <metadata>
        <title>glibc: Fix of CVE-2019-9169</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1757700075" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1757700075" source="CLSA"/>
        <reference ref_id="CVE-2019-9169" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-9169" source="CVE"/>
        <description>- CVE-2019-9169: fix heap-based buffer over-read in proceed_next_node in
  posix/regexec.c</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-12"/>
          <updated date="2025-09-12"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2019-9169" impact="critical" public="20190226">CVE-2019-9169</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1757700075007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758010245" version="1">
      <metadata>
        <title>kernel: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758010245" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758010245" source="CLSA"/>
        <reference ref_id="CVE-2025-38352" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38352" source="CVE"/>
        <reference ref_id="CVE-2025-38177" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38177" source="CVE"/>
        <reference ref_id="CVE-2025-38180" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38180" source="CVE"/>
        <description>- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() {CVE-2025-38352}
- sch_qfq: make qfq_qlen_notify() idempotent {CVE-2025-38177}
- sch_hfsc: make hfsc_qlen_notify() idempotent {CVE-2025-38177}
- sch_drr: make drr_qlen_notify() idempotent {CVE-2025-38177}
- sch_htb: make htb_qlen_notify() idempotent {CVE-2025-38177}
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- net: atm: add lec_mutex {CVE-2025-38180}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-16"/>
          <updated date="2025-09-16"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2025-38352" impact="important" public="20250722">CVE-2025-38352</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-459" href="https://cve.tuxcare.com/els/cve/CVE-2025-38177" impact="important" public="20250704">CVE-2025-38177</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-38180" impact="important" public="20250704">CVE-2025-38180</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1758010245001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" test_ref="oval:com.tuxcare.clsa:tst:1758010245011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758796854" version="1">
      <metadata>
        <title>cups: Fix of CVE-2023-4504</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758796854" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758796854" source="CLSA"/>
        <reference ref_id="CVE-2023-4504" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-4504" source="CVE"/>
        <description>- CVE-2023-4504: check for null terminator after a backslash</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-25"/>
          <updated date="2025-09-25"/>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-122" href="https://cve.tuxcare.com/els/cve/CVE-2023-4504" impact="important" public="20230921">CVE-2023-4504</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="cups is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758796854001"/>
        <criteria operator="AND">
          <criterion comment="cups isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1758796854002"/>
          <criterion comment="cups isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1758796854003"/>
        </criteria>
        <criterion comment="cups-devel is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758796854004"/>
        <criteria operator="AND">
          <criterion comment="cups-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1758796854005"/>
          <criterion comment="cups-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1758796854006"/>
        </criteria>
        <criterion comment="cups-libs is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758796854007"/>
        <criteria operator="AND">
          <criterion comment="cups-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1758796854008"/>
          <criterion comment="cups-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1758796854009"/>
        </criteria>
        <criterion comment="cups-lpd is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758796854010"/>
        <criteria operator="AND">
          <criterion comment="cups-lpd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1758796854011"/>
          <criterion comment="cups-lpd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1758796854012"/>
        </criteria>
        <criterion comment="cups-php is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758796854013"/>
        <criteria operator="AND">
          <criterion comment="cups-php isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1758796854014"/>
          <criterion comment="cups-php isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1758796854015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758796775" version="1">
      <metadata>
        <title>spamassassin: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758796775" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758796775" source="CLSA"/>
        <reference ref_id="CVE-2020-1931" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-1931" source="CVE"/>
        <reference ref_id="CVE-2020-1930" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-1930" source="CVE"/>
        <description>- CVE-2020-1930: fix command-execution vulnerability in SpamAssassin .cf parsing
- CVE-2020-1931: fix command-execution vulnerability in SpamAssassin .cf parsing</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-25"/>
          <updated date="2025-09-25"/>
          <cve cvss2="9.3/AV:N/AC:M/Au:N/C:C/I:C/A:C" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://cve.tuxcare.com/els/cve/CVE-2020-1931" impact="important" public="20200130">CVE-2020-1931</cve>
          <cve cvss2="9.3/AV:N/AC:M/Au:N/C:C/I:C/A:C" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-78" href="https://cve.tuxcare.com/els/cve/CVE-2020-1930" impact="important" public="20200130">CVE-2020-1930</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="spamassassin is earlier than 0:3.3.1-3.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758796775001"/>
        <criteria operator="AND">
          <criterion comment="spamassassin isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1758796775002"/>
          <criterion comment="spamassassin isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1758796775003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758711950" version="1">
      <metadata>
        <title>glibc: Fix of CVE-2020-1752</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758711950" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758711950" source="CLSA"/>
        <reference ref_id="CVE-2020-35457" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-35457" source="CVE"/>
        <description>- CVE-2020-1752: fix use-after-free vulnerability in glob</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-24"/>
          <updated date="2025-09-24"/>
          <cve cvss2="4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2020-35457" impact="important" public="20201214">CVE-2020-35457</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950001"/>
        <criteria operator="AND">
          <criterion comment="glibc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067002"/>
          <criterion comment="glibc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067003"/>
        </criteria>
        <criterion comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950002"/>
        <criteria operator="AND">
          <criterion comment="glibc-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067005"/>
          <criterion comment="glibc-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067006"/>
        </criteria>
        <criterion comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950003"/>
        <criteria operator="AND">
          <criterion comment="glibc-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067008"/>
          <criterion comment="glibc-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067009"/>
        </criteria>
        <criterion comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950004"/>
        <criteria operator="AND">
          <criterion comment="glibc-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067011"/>
          <criterion comment="glibc-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067012"/>
        </criteria>
        <criterion comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950005"/>
        <criteria operator="AND">
          <criterion comment="glibc-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067014"/>
          <criterion comment="glibc-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067015"/>
        </criteria>
        <criterion comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950006"/>
        <criteria operator="AND">
          <criterion comment="glibc-utils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067017"/>
          <criterion comment="glibc-utils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067018"/>
        </criteria>
        <criterion comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1758711950007"/>
        <criteria operator="AND">
          <criterion comment="nscd isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1629395067020"/>
          <criterion comment="nscd isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1629395067021"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758645818" version="1">
      <metadata>
        <title>openldap: Fix of 14 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758645818" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758645818" source="CLSA"/>
        <reference ref_id="CVE-2020-25710" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25710" source="CVE"/>
        <reference ref_id="CVE-2020-25709" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25709" source="CVE"/>
        <reference ref_id="CVE-2020-36222" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36222" source="CVE"/>
        <reference ref_id="CVE-2020-36224" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36224" source="CVE"/>
        <reference ref_id="CVE-2020-36230" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36230" source="CVE"/>
        <reference ref_id="CVE-2020-36227" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36227" source="CVE"/>
        <reference ref_id="CVE-2020-25692" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25692" source="CVE"/>
        <reference ref_id="CVE-2020-36225" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36225" source="CVE"/>
        <reference ref_id="CVE-2020-36228" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36228" source="CVE"/>
        <reference ref_id="CVE-2020-36226" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36226" source="CVE"/>
        <reference ref_id="CVE-2020-36221" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36221" source="CVE"/>
        <reference ref_id="CVE-2020-12243" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-12243" source="CVE"/>
        <reference ref_id="CVE-2020-36223" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36223" source="CVE"/>
        <reference ref_id="CVE-2020-36229" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36229" source="CVE"/>
        <description>- Rebase to 2.4.58 to fix the following vulnerabilities:
- CVE-2020-12243: fix denial of service caused by LDAP search filters with nested
  boolean expressions
- CVE-2020-36221: fix integer underflow in the Certificate Exact Assertion processing
- CVE-2020-36223: fix slapd crash in the Values Return Filter control handling
- CVE-2020-36226: fix slapd crash in the saslAuthzTo processing
- CVE-2020-36228: fix slapd crash in the Certificate List Exact Assertion processing
- CVE-2020-36225: fix double free and slapd crash in the saslAuthzTo processing
- CVE-2020-36227: fix infinite loop in slapd with the cancel_extop Cancel operation
- CVE-2020-36230: fix assertion failure in slapd in the X.509 DN parsing in decode.c
- CVE-2020-25692: fix NULL pointer dereference during a request for renaming RDNs
- CVE-2020-25709: fix assertion failure caused by processing malicious packet
- CVE-2020-36224: fix invalid pointer free and slapd crash in the saslAuthzTo
  processing
- CVE-2020-36229: fix slapd crash in the X.509 DN parsing in ad_keystring
- CVE-2020-25710: fix failed assertion in csnNormalize23()
- CVE-2020-36222: fix assertion failure in slapd in the saslAuthzTo validation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-23"/>
          <updated date="2025-09-23"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2020-25710" impact="important" public="20210528">CVE-2020-25710</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2020-25709" impact="important" public="20210518">CVE-2020-25709</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2020-36222" impact="important" public="20210126">CVE-2020-36222</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-763" href="https://cve.tuxcare.com/els/cve/CVE-2020-36224" impact="important" public="20210126">CVE-2020-36224</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-617" href="https://cve.tuxcare.com/els/cve/CVE-2020-36230" impact="important" public="20210126">CVE-2020-36230</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els/cve/CVE-2020-36227" impact="important" public="20210126">CVE-2020-36227</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2020-25692" impact="important" public="20201208">CVE-2020-25692</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2020-36225" impact="important" public="20210126">CVE-2020-36225</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-191" href="https://cve.tuxcare.com/els/cve/CVE-2020-36228" impact="important" public="20210126">CVE-2020-36228</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2020-36226" impact="important" public="20210126">CVE-2020-36226</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-191" href="https://cve.tuxcare.com/els/cve/CVE-2020-36221" impact="important" public="20210126">CVE-2020-36221</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2020-12243" impact="important" public="20200428">CVE-2020-12243</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-36223" impact="important" public="20210126">CVE-2020-36223</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-843" href="https://cve.tuxcare.com/els/cve/CVE-2020-36229" impact="important" public="20210126">CVE-2020-36229</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openldap is earlier than 0:2.4.58-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645818001"/>
        <criteria operator="AND">
          <criterion comment="openldap isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748002"/>
          <criterion comment="openldap isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748003"/>
        </criteria>
        <criterion comment="openldap-clients is earlier than 0:2.4.58-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645818002"/>
        <criteria operator="AND">
          <criterion comment="openldap-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748005"/>
          <criterion comment="openldap-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748006"/>
        </criteria>
        <criterion comment="openldap-devel is earlier than 0:2.4.58-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645818003"/>
        <criteria operator="AND">
          <criterion comment="openldap-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748008"/>
          <criterion comment="openldap-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748009"/>
        </criteria>
        <criterion comment="openldap-servers is earlier than 0:2.4.58-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645818004"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748011"/>
          <criterion comment="openldap-servers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748012"/>
        </criteria>
        <criterion comment="openldap-servers-sql is earlier than 0:2.4.58-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645818005"/>
        <criteria operator="AND">
          <criterion comment="openldap-servers-sql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803748014"/>
          <criterion comment="openldap-servers-sql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803748015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758709468" version="1">
      <metadata>
        <title>glib2: Fix of CVE-2020-35457</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758709468" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758709468" source="CLSA"/>
        <reference ref_id="CVE-2020-1752" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-1752" source="CVE"/>
        <description>- CVE-2020-35457: fix integer overflow in g_option_group_add_entries to prevent
  potential out-of-bounds write
- Bug775510: avoid calling Standard C string/array functions with NULL arguments</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-24"/>
          <updated date="2025-09-24"/>
          <cve cvss2="3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-1752" impact="important" public="20200430">CVE-2020-1752</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1758709468001"/>
        <criteria operator="AND">
          <criterion comment="glib2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923002"/>
          <criterion comment="glib2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923003"/>
        </criteria>
        <criterion comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1758709468002"/>
        <criteria operator="AND">
          <criterion comment="glib2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923005"/>
          <criterion comment="glib2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923006"/>
        </criteria>
        <criterion comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1758709468003"/>
        <criteria operator="AND">
          <criterion comment="glib2-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923008"/>
          <criterion comment="glib2-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923009"/>
        </criteria>
        <criterion comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1758709468004"/>
        <criteria operator="AND">
          <criterion comment="glib2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923011"/>
          <criterion comment="glib2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758645375" version="1">
      <metadata>
        <title>libwebp: Fix of CVE-2020-36328</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758645375" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758645375" source="CLSA"/>
        <reference ref_id="CVE-2020-36328" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36328" source="CVE"/>
        <description>- CVE-2020-36328: fix a heap-based buffer overflow in WebPDecode*Into functions</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-23"/>
          <updated date="2025-09-23"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2020-36328" impact="critical" public="20210521">CVE-2020-36328</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libwebp is earlier than 0:0.4.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758645375001"/>
        <criteria operator="AND">
          <criterion comment="libwebp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085002"/>
          <criterion comment="libwebp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085003"/>
        </criteria>
        <criterion comment="libwebp-devel is earlier than 0:0.4.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758645375002"/>
        <criteria operator="AND">
          <criterion comment="libwebp-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085005"/>
          <criterion comment="libwebp-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085006"/>
        </criteria>
        <criterion comment="libwebp-java is earlier than 0:0.4.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758645375003"/>
        <criteria operator="AND">
          <criterion comment="libwebp-java isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085008"/>
          <criterion comment="libwebp-java isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085009"/>
        </criteria>
        <criterion comment="libwebp-tools is earlier than 0:0.4.3-3.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758645375004"/>
        <criteria operator="AND">
          <criterion comment="libwebp-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085011"/>
          <criterion comment="libwebp-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758645976" version="1">
      <metadata>
        <title>dovecot: Fix of CVE-2020-12673</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758645976" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758645976" source="CLSA"/>
        <reference ref_id="CVE-2020-12673" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-12673" source="CVE"/>
        <description>- CVE-2020-12673: fix reading past buffer</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-23"/>
          <updated date="2025-09-23"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-12673" impact="important" public="20200812">CVE-2020-12673</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="dovecot is earlier than 1:2.0.9-23.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645976001"/>
        <criteria operator="AND">
          <criterion comment="dovecot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745002"/>
          <criterion comment="dovecot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745003"/>
        </criteria>
        <criterion comment="dovecot-devel is earlier than 1:2.0.9-23.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645976002"/>
        <criteria operator="AND">
          <criterion comment="dovecot-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745005"/>
          <criterion comment="dovecot-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745006"/>
        </criteria>
        <criterion comment="dovecot-mysql is earlier than 1:2.0.9-23.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645976003"/>
        <criteria operator="AND">
          <criterion comment="dovecot-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745008"/>
          <criterion comment="dovecot-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745009"/>
        </criteria>
        <criterion comment="dovecot-pgsql is earlier than 1:2.0.9-23.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645976004"/>
        <criteria operator="AND">
          <criterion comment="dovecot-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745011"/>
          <criterion comment="dovecot-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745012"/>
        </criteria>
        <criterion comment="dovecot-pigeonhole is earlier than 1:2.0.9-23.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1758645976005"/>
        <criteria operator="AND">
          <criterion comment="dovecot-pigeonhole isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745014"/>
          <criterion comment="dovecot-pigeonhole isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758896552" version="1">
      <metadata>
        <title>dovecot: Fix of CVE-2020-12674</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758896552" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758896552" source="CLSA"/>
        <reference ref_id="CVE-2020-12674" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-12674" source="CVE"/>
        <description>- CVE-2020-12674: fix mishandling of zero length in RPA request to prevent auth
  service crash</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-26"/>
          <updated date="2025-09-26"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-12674" impact="important" public="20200812">CVE-2020-12674</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="dovecot is earlier than 1:2.0.9-23.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758896552001"/>
        <criteria operator="AND">
          <criterion comment="dovecot isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745002"/>
          <criterion comment="dovecot isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745003"/>
        </criteria>
        <criterion comment="dovecot-devel is earlier than 1:2.0.9-23.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758896552002"/>
        <criteria operator="AND">
          <criterion comment="dovecot-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745005"/>
          <criterion comment="dovecot-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745006"/>
        </criteria>
        <criterion comment="dovecot-mysql is earlier than 1:2.0.9-23.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758896552003"/>
        <criteria operator="AND">
          <criterion comment="dovecot-mysql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745008"/>
          <criterion comment="dovecot-mysql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745009"/>
        </criteria>
        <criterion comment="dovecot-pgsql is earlier than 1:2.0.9-23.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758896552004"/>
        <criteria operator="AND">
          <criterion comment="dovecot-pgsql isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745011"/>
          <criterion comment="dovecot-pgsql isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745012"/>
        </criteria>
        <criterion comment="dovecot-pigeonhole is earlier than 1:2.0.9-23.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1758896552005"/>
        <criteria operator="AND">
          <criterion comment="dovecot-pigeonhole isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1634573745014"/>
          <criterion comment="dovecot-pigeonhole isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1634573745015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1758896647" version="1">
      <metadata>
        <title>glib2: Fix of CVE-2024-52533</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1758896647" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1758896647" source="CLSA"/>
        <reference ref_id="CVE-2024-52533" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-52533" source="CVE"/>
        <description>- CVE-2024-52533: fix off-by-one error and resulting buffer overflow in
  gsocks4aproxy.c by increasing SOCKS4_CONN_MSG_LEN</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-26"/>
          <updated date="2025-09-26"/>
          <cve cvss3="7.0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cwe="CWE-193" href="https://cve.tuxcare.com/els/cve/CVE-2024-52533" impact="important" public="20241111">CVE-2024-52533</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1758896647001"/>
        <criteria operator="AND">
          <criterion comment="glib2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923002"/>
          <criterion comment="glib2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923003"/>
        </criteria>
        <criterion comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1758896647002"/>
        <criteria operator="AND">
          <criterion comment="glib2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923005"/>
          <criterion comment="glib2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923006"/>
        </criteria>
        <criterion comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1758896647003"/>
        <criteria operator="AND">
          <criterion comment="glib2-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923008"/>
          <criterion comment="glib2-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923009"/>
        </criteria>
        <criterion comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els5" test_ref="oval:com.tuxcare.clsa:tst:1758896647004"/>
        <criteria operator="AND">
          <criterion comment="glib2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923011"/>
          <criterion comment="glib2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759154304" version="1">
      <metadata>
        <title>libwebp: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759154304" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1759154304" source="CLSA"/>
        <reference ref_id="CVE-2020-36331" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36331" source="CVE"/>
        <reference ref_id="CVE-2020-36330" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36330" source="CVE"/>
        <reference ref_id="CVE-2020-36329" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-36329" source="CVE"/>
        <description>- CVE-2020-36329: fix use-after-free vulnerability by delaying thread
  termination
- CVE-2020-36330: fix out-of-bounds read in ChunkVerifyAndAssign function
- CVE-2020-36331: fix out-of-bounds read in ChunkAssignData function</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-09-29"/>
          <updated date="2025-09-29"/>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-36331" impact="critical" public="20210521">CVE-2020-36331</cve>
          <cve cvss2="6.4/AV:N/AC:L/Au:N/C:P/I:N/A:P" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2020-36330" impact="critical" public="20210521">CVE-2020-36330</cve>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2020-36329" impact="critical" public="20210521">CVE-2020-36329</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libwebp is earlier than 0:0.4.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1759154304001"/>
        <criteria operator="AND">
          <criterion comment="libwebp isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085002"/>
          <criterion comment="libwebp isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085003"/>
        </criteria>
        <criterion comment="libwebp-devel is earlier than 0:0.4.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1759154304002"/>
        <criteria operator="AND">
          <criterion comment="libwebp-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085005"/>
          <criterion comment="libwebp-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085006"/>
        </criteria>
        <criterion comment="libwebp-java is earlier than 0:0.4.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1759154304003"/>
        <criteria operator="AND">
          <criterion comment="libwebp-java isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085008"/>
          <criterion comment="libwebp-java isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085009"/>
        </criteria>
        <criterion comment="libwebp-tools is earlier than 0:0.4.3-3.el6.tuxcare.els3" test_ref="oval:com.tuxcare.clsa:tst:1759154304004"/>
        <criteria operator="AND">
          <criterion comment="libwebp-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1697136085011"/>
          <criterion comment="libwebp-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1697136085012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759336759" version="1">
      <metadata>
        <title>libxml2: Fix of CVE-2025-6021</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759336759" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1759336759" source="CLSA"/>
        <reference ref_id="CVE-2025-6021" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-6021" source="CVE"/>
        <description>- CVE-2025-6021: fix integer overflows in buffer size calculations</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-01"/>
          <updated date="2025-10-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-6021" impact="important" public="20250612">CVE-2025-6021</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1759336759001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1759336759002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1759336759003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1759336759004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759433716" version="1">
      <metadata>
        <title>samba: Fix of CVE-2020-25717</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759433716" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1759433716" source="CLSA"/>
        <reference ref_id="CVE-2020-25717" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25717" source="CVE"/>
        <description>- CVE-2020-25717: Adapt CVE's patch to Centos 6 based systems where
  regular user id starts from 500, so change the default value
  of the new config parameters added: "min domain uid" to 500</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-02"/>
          <updated date="2025-10-02"/>
          <cve cvss2="8.5/AV:N/AC:L/Au:S/C:C/I:C/A:N" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2020-25717" impact="important" public="20220218">CVE-2020-25717</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libsmbclient is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716001"/>
        <criteria operator="AND">
          <criterion comment="libsmbclient isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238002"/>
          <criterion comment="libsmbclient isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238003"/>
        </criteria>
        <criterion comment="libsmbclient-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716002"/>
        <criteria operator="AND">
          <criterion comment="libsmbclient-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238005"/>
          <criterion comment="libsmbclient-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238006"/>
        </criteria>
        <criterion comment="samba is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716003"/>
        <criteria operator="AND">
          <criterion comment="samba isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238008"/>
          <criterion comment="samba isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238009"/>
        </criteria>
        <criterion comment="samba-client is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716004"/>
        <criteria operator="AND">
          <criterion comment="samba-client isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238011"/>
          <criterion comment="samba-client isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238012"/>
        </criteria>
        <criterion comment="samba-common is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716005"/>
        <criteria operator="AND">
          <criterion comment="samba-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238014"/>
          <criterion comment="samba-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238015"/>
        </criteria>
        <criterion comment="samba-doc is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716006"/>
        <criteria operator="AND">
          <criterion comment="samba-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238017"/>
          <criterion comment="samba-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238018"/>
        </criteria>
        <criterion comment="samba-domainjoin-gui is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716007"/>
        <criteria operator="AND">
          <criterion comment="samba-domainjoin-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238020"/>
          <criterion comment="samba-domainjoin-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238021"/>
        </criteria>
        <criterion comment="samba-glusterfs is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716008"/>
        <criteria operator="AND">
          <criterion comment="samba-glusterfs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238023"/>
          <criterion comment="samba-glusterfs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238024"/>
        </criteria>
        <criterion comment="samba-swat is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716009"/>
        <criteria operator="AND">
          <criterion comment="samba-swat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238026"/>
          <criterion comment="samba-swat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238027"/>
        </criteria>
        <criterion comment="samba-winbind is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716010"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238029"/>
          <criterion comment="samba-winbind isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238030"/>
        </criteria>
        <criterion comment="samba-winbind-clients is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716011"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-clients isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238032"/>
          <criterion comment="samba-winbind-clients isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238033"/>
        </criteria>
        <criterion comment="samba-winbind-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716012"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238035"/>
          <criterion comment="samba-winbind-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238036"/>
        </criteria>
        <criterion comment="samba-winbind-krb5-locator is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1759433716013"/>
        <criteria operator="AND">
          <criterion comment="samba-winbind-krb5-locator isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1692293238038"/>
          <criterion comment="samba-winbind-krb5-locator isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1692293238039"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1759485890" version="1">
      <metadata>
        <title>openvpn: Fix of CVE-2020-15078</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1759485890" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1759485890" source="CLSA"/>
        <reference ref_id="CVE-2020-15078" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-15078" source="CVE"/>
        <description>- CVE-2020-15078: fix authentication bypass and access to control channel data on
  servers configured with deferred authentication</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-03"/>
          <updated date="2025-10-03"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:P/I:N/A:N" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-305" href="https://cve.tuxcare.com/els/cve/CVE-2020-15078" impact="important" public="20210426">CVE-2020-15078</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openvpn is earlier than 0:2.4.9-1.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1759485890001"/>
        <criteria operator="AND">
          <criterion comment="openvpn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649171018002"/>
          <criterion comment="openvpn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649171018003"/>
        </criteria>
        <criterion comment="openvpn-devel is earlier than 0:2.4.9-1.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1759485890002"/>
        <criteria operator="AND">
          <criterion comment="openvpn-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649171018005"/>
          <criterion comment="openvpn-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649171018006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760112150" version="1">
      <metadata>
        <title>nss: Fix of CVE-2020-25648</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760112150" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1760112150" source="CLSA"/>
        <reference ref_id="CVE-2020-25648" ref_url="https://cve.tuxcare.com/els/cve/CVE-2020-25648" source="CVE"/>
        <description>- CVE-2020-25648: fix DoS in case of receiving multiple CCS messages
- extended tests</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-10"/>
          <updated date="2025-10-10"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-770" href="https://cve.tuxcare.com/els/cve/CVE-2020-25648" impact="important" public="20201020">CVE-2020-25648</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="nss is earlier than 0:3.44.0-12.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1760112150001"/>
        <criteria operator="AND">
          <criterion comment="nss isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354002"/>
          <criterion comment="nss isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354003"/>
        </criteria>
        <criterion comment="nss-devel is earlier than 0:3.44.0-12.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1760112150002"/>
        <criteria operator="AND">
          <criterion comment="nss-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354005"/>
          <criterion comment="nss-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354006"/>
        </criteria>
        <criterion comment="nss-pkcs11-devel is earlier than 0:3.44.0-12.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1760112150003"/>
        <criteria operator="AND">
          <criterion comment="nss-pkcs11-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354008"/>
          <criterion comment="nss-pkcs11-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354009"/>
        </criteria>
        <criterion comment="nss-sysinit is earlier than 0:3.44.0-12.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1760112150004"/>
        <criteria operator="AND">
          <criterion comment="nss-sysinit isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354011"/>
          <criterion comment="nss-sysinit isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354012"/>
        </criteria>
        <criterion comment="nss-tools is earlier than 0:3.44.0-12.el6.tuxcare.els8" test_ref="oval:com.tuxcare.clsa:tst:1760112150005"/>
        <criteria operator="AND">
          <criterion comment="nss-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1640002354014"/>
          <criterion comment="nss-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1640002354015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760112341" version="1">
      <metadata>
        <title>binutils: Fix of CVE-2017-9042</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760112341" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1760112341" source="CLSA"/>
        <reference ref_id="CVE-2017-9042" ref_url="https://cve.tuxcare.com/els/cve/CVE-2017-9042" source="CVE"/>
        <description>- CVE-2017-9042: readelf.c fix a possible application crash known as the
  "cannot be represented in type long" issue</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-10"/>
          <updated date="2025-10-10"/>
          <cve cvss2="6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-704" href="https://cve.tuxcare.com/els/cve/CVE-2017-9042" impact="important" public="20170518">CVE-2017-9042</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1760112341001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els9" test_ref="oval:com.tuxcare.clsa:tst:1760112341002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1760559298" version="1">
      <metadata>
        <title>openssl: Fix of CVE-2018-0734</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1760559298" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1760559298" source="CLSA"/>
        <reference ref_id="CVE-2019-1547" ref_url="https://cve.tuxcare.com/els/cve/CVE-2019-1547" source="CVE"/>
        <reference ref_id="CVE-2018-0734" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-0734" source="CVE"/>
        <reference ref_id="CVE-2025-9230" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-9230" source="CVE"/>
        <description>- CVE-2018-0734: fix timing side channel attack in DSA signature algorithm</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-15"/>
          <updated date="2025-10-15"/>
          <cve cvss2="1.9/AV:L/AC:M/Au:N/C:P/I:N/A:N" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2019-1547" impact="moderate" public="20190910">CVE-2019-1547</cve>
          <cve cvss2="4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-327" href="https://cve.tuxcare.com/els/cve/CVE-2018-0734" impact="moderate" public="20181030">CVE-2018-0734</cve>
          <cve cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2025-9230" impact="moderate" public="20250930">CVE-2025-9230</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1760559298001"/>
        <criteria operator="AND">
          <criterion comment="openssl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134002"/>
          <criterion comment="openssl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134003"/>
        </criteria>
        <criterion comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1760559298002"/>
        <criteria operator="AND">
          <criterion comment="openssl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134005"/>
          <criterion comment="openssl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134006"/>
        </criteria>
        <criterion comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1760559298003"/>
        <criteria operator="AND">
          <criterion comment="openssl-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134008"/>
          <criterion comment="openssl-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134009"/>
        </criteria>
        <criterion comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els13" test_ref="oval:com.tuxcare.clsa:tst:1760559298004"/>
        <criteria operator="AND">
          <criterion comment="openssl-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724134011"/>
          <criterion comment="openssl-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724134012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1761139574" version="1">
      <metadata>
        <title>libxml2: Fix of CVE-2022-49043</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1761139574" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1761139574" source="CLSA"/>
        <reference ref_id="CVE-2022-49043" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49043" source="CVE"/>
        <description>- CVE-2022-49043: fix use-after-free in xmlXIncludeAddNode, free URI after reporting
  the error to avoid use-after-free</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-22"/>
          <updated date="2025-10-22"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-49043" impact="important" public="20250126">CVE-2022-49043</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1761139574001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1761139574002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1761139574003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1761139574004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1762454401" version="1">
      <metadata>
        <title>kernel: Fix of 6 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1762454401" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1762454401" source="CLSA"/>
        <reference ref_id="CVE-2022-48757" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48757" source="CVE"/>
        <reference ref_id="CVE-2022-23037" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23037" source="CVE"/>
        <reference ref_id="CVE-2025-22004" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-22004" source="CVE"/>
        <reference ref_id="CVE-2022-49292" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49292" source="CVE"/>
        <reference ref_id="CVE-2025-38477" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38477" source="CVE"/>
        <description>- fix: virtio-net: Add validation for used length {CVE-2021-47352}
- xen/netfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23037}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- net: fix information leakage in /proc/net/ptype {CVE-2022-48757}
- net: atm: fix use after free in lec_send() {CVE-2025-22004}
- ALSA: oss: Fix PCM OSS buffer allocation overflow {CVE-2022-49292}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-06"/>
          <updated date="2025-11-06"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-668" href="https://cve.tuxcare.com/els/cve/CVE-2022-48757" impact="important" public="20240620">CVE-2022-48757</cve>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-23037" impact="important" public="20220310">CVE-2022-23037</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-22004" impact="important" public="20250403">CVE-2025-22004</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-49292" impact="important" public="20250226">CVE-2022-49292</cve>
          <cve cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-38477" impact="important" public="20250728">CVE-2025-38477</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1762454401001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" test_ref="oval:com.tuxcare.clsa:tst:1762454401011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1761139764" version="1">
      <metadata>
        <title>kernel: Fix of 39 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1761139764" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1761139764" source="CLSA"/>
        <reference ref_id="CVE-2024-38599" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-38599" source="CVE"/>
        <reference ref_id="CVE-2023-52885" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52885" source="CVE"/>
        <reference ref_id="CVE-2024-38538" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-38538" source="CVE"/>
        <reference ref_id="CVE-2024-35896" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-35896" source="CVE"/>
        <reference ref_id="CVE-2021-47391" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47391" source="CVE"/>
        <reference ref_id="CVE-2022-49407" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49407" source="CVE"/>
        <reference ref_id="CVE-2021-47118" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47118" source="CVE"/>
        <reference ref_id="CVE-2024-41014" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-41014" source="CVE"/>
        <reference ref_id="CVE-2022-45885" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45885" source="CVE"/>
        <reference ref_id="CVE-2024-38578" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-38578" source="CVE"/>
        <reference ref_id="CVE-2021-47633" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47633" source="CVE"/>
        <reference ref_id="CVE-2023-52868" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52868" source="CVE"/>
        <reference ref_id="CVE-2024-26982" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-26982" source="CVE"/>
        <reference ref_id="CVE-2022-45919" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45919" source="CVE"/>
        <reference ref_id="CVE-2024-26958" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-26958" source="CVE"/>
        <reference ref_id="CVE-2023-52530" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52530" source="CVE"/>
        <reference ref_id="CVE-2024-56597" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56597" source="CVE"/>
        <reference ref_id="CVE-2023-51779" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-51779" source="CVE"/>
        <reference ref_id="CVE-2022-23038" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23038" source="CVE"/>
        <reference ref_id="CVE-2022-45884" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45884" source="CVE"/>
        <reference ref_id="CVE-2022-45886" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-45886" source="CVE"/>
        <reference ref_id="CVE-2022-25265" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-25265" source="CVE"/>
        <reference ref_id="CVE-2024-35937" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-35937" source="CVE"/>
        <reference ref_id="CVE-2023-52594" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52594" source="CVE"/>
        <reference ref_id="CVE-2024-40901" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-40901" source="CVE"/>
        <reference ref_id="CVE-2024-52332" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-52332" source="CVE"/>
        <reference ref_id="CVE-2022-48695" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48695" source="CVE"/>
        <reference ref_id="CVE-2022-48760" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48760" source="CVE"/>
        <reference ref_id="CVE-2021-47352" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47352" source="CVE"/>
        <reference ref_id="CVE-2021-47321" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47321" source="CVE"/>
        <reference ref_id="CVE-2021-47383" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47383" source="CVE"/>
        <reference ref_id="CVE-2024-39487" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-39487" source="CVE"/>
        <reference ref_id="CVE-2023-52764" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52764" source="CVE"/>
        <reference ref_id="CVE-2024-26974" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-26974" source="CVE"/>
        <reference ref_id="CVE-2021-47153" ref_url="https://cve.tuxcare.com/els/cve/CVE-2021-47153" source="CVE"/>
        <reference ref_id="CVE-2022-48827" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48827" source="CVE"/>
        <reference ref_id="CVE-2024-56616" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56616" source="CVE"/>
        <reference ref_id="CVE-2023-1077" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1077" source="CVE"/>
        <reference ref_id="CVE-2023-35824" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-35824" source="CVE"/>
        <description>- nfs: fix UAF in direct writes {CVE-2024-26958}
- NFSD: Fix the behavior of READ near OFFSET_MAX {CVE-2022-48827}
- thermal: core: prevent potential string overflow {CVE-2023-52868}
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 {CVE-2021-47633}
- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests {CVE-2021-47391}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- wifi: mac80211: fix potential key use-after-free {CVE-2023-52530}
- crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}
- netfilter: validate user input for expected length {CVE-2024-35896}
- wifi: cfg80211: check A-MSDU format more carefully {CVE-2024-35937}
- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- tty: Fix out-of-bound vmalloc access in imageblit {CVE-2021-47383}
- watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321}
- virtio-net: Add validation for used length {CVE-2021-47352}
- USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760}
- scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695}
- jffs2: prevent xattr node from overflowing the eraseblock {CVE-2024-38599}
- ecryptfs: Fix buffer size for tag 66 packet {CVE-2024-38578}
- dlm: fix plock invalid read {CVE-2022-49407}
- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}
- igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332}
- jfs: fix shift-out-of-bounds in dbSplit {CVE-2024-56597}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779}
- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition {CVE-2023-35824}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23038}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886}
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend {CVE-2022-45885}
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919}
- x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit {CVE-2022-25265}
- x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK {CVE-2022-25265}
- x86/elf: Add table to document READ_IMPLIES_EXEC {CVE-2022-25265}
- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-22"/>
          <updated date="2025-10-22"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-38599" impact="important" public="20240619">CVE-2024-38599</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52885" impact="important" public="20240714">CVE-2023-52885</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-908" href="https://cve.tuxcare.com/els/cve/CVE-2024-38538" impact="important" public="20240619">CVE-2024-38538</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-35896" impact="important" public="20240519">CVE-2024-35896</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47391" impact="important" public="20240521">CVE-2021-47391</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-49407" impact="important" public="20250226">CVE-2022-49407</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47118" impact="important" public="20240315">CVE-2021-47118</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-41014" impact="important" public="20240729">CVE-2024-41014</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-45885" impact="important" public="20221125">CVE-2022-45885</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-38578" impact="important" public="20240619">CVE-2024-38578</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47633" impact="important" public="20250226">CVE-2021-47633</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-52868" impact="important" public="20240521">CVE-2023-52868</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-26982" impact="important" public="20240501">CVE-2024-26982</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-45919" impact="important" public="20221127">CVE-2022-45919</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-26958" impact="important" public="20240501">CVE-2024-26958</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52530" impact="important" public="20240302">CVE-2023-52530</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-56597" impact="important" public="20241227">CVE-2024-56597</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-51779" impact="important" public="20231225">CVE-2023-51779</cve>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-23038" impact="important" public="20220310">CVE-2022-23038</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-45884" impact="important" public="20221125">CVE-2022-45884</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-45886" impact="important" public="20221125">CVE-2022-45886</cve>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-913" href="https://cve.tuxcare.com/els/cve/CVE-2022-25265" impact="important" public="20220216">CVE-2022-25265</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-35937" impact="important" public="20240519">CVE-2024-35937</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2023-52594" impact="important" public="20240306">CVE-2023-52594</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-40901" impact="important" public="20240712">CVE-2024-40901</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-52332" impact="important" public="20250111">CVE-2024-52332</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-48695" impact="important" public="20240503">CVE-2022-48695</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-667" href="https://cve.tuxcare.com/els/cve/CVE-2022-48760" impact="important" public="20240620">CVE-2022-48760</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2021-47352" impact="important" public="20240521">CVE-2021-47352</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2021-47321" impact="important" public="20240521">CVE-2021-47321</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47383" impact="important" public="20240521">CVE-2021-47383</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-39487" impact="important" public="20240709">CVE-2024-39487</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2023-52764" impact="important" public="20240521">CVE-2023-52764</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-367" href="https://cve.tuxcare.com/els/cve/CVE-2024-26974" impact="important" public="20240501">CVE-2024-26974</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2021-47153" impact="important" public="20240325">CVE-2021-47153</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-48827" impact="important" public="20240716">CVE-2022-48827</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2024-56616" impact="important" public="20241227">CVE-2024-56616</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-843" href="https://cve.tuxcare.com/els/cve/CVE-2023-1077" impact="important" public="20230327">CVE-2023-1077</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2023-35824" impact="important" public="20230618">CVE-2023-35824</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1761139764001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" test_ref="oval:com.tuxcare.clsa:tst:1761139764011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1761859779" version="1">
      <metadata>
        <title>libxml2: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1761859779" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1761859779" source="CLSA"/>
        <reference ref_id="CVE-2024-56171" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-56171" source="CVE"/>
        <reference ref_id="CVE-2025-24928" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-24928" source="CVE"/>
        <description>- CVE-2024-56171: fix use-after-free in xmlSchemaIDCFillNodeTables and
  xmlSchemaBubbleIDCNodeTables in xmlschemas.c
- CVE-2025-24928: fix stack-based buffer overflow in xmlSnprintfElements in valid.c</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-10-30"/>
          <updated date="2025-10-30"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2024-56171" impact="critical" public="20250218">CVE-2024-56171</cve>
          <cve cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cwe="CWE-121" href="https://cve.tuxcare.com/els/cve/CVE-2025-24928" impact="important" public="20250218">CVE-2025-24928</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1761859779001"/>
        <criteria operator="AND">
          <criterion comment="libxml2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536002"/>
          <criterion comment="libxml2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536003"/>
        </criteria>
        <criterion comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1761859779002"/>
        <criteria operator="AND">
          <criterion comment="libxml2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536005"/>
          <criterion comment="libxml2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536006"/>
        </criteria>
        <criterion comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1761859779003"/>
        <criteria operator="AND">
          <criterion comment="libxml2-python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536008"/>
          <criterion comment="libxml2-python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536009"/>
        </criteria>
        <criterion comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1761859779004"/>
        <criteria operator="AND">
          <criterion comment="libxml2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1641903536011"/>
          <criterion comment="libxml2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1641903536012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1763543346" version="1">
      <metadata>
        <title>squid: Fix of CVE-2025-62168</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1763543346" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1763543346" source="CLSA"/>
        <reference ref_id="CVE-2025-62168" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-62168" source="CVE"/>
        <description>- CVE-2025-62168: Fix failure to redact HTTP authentication credentials in error
  handling to prevent information disclosure</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-19"/>
          <updated date="2025-11-19"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-209" href="https://cve.tuxcare.com/els/cve/CVE-2025-62168" impact="important" public="20251017">CVE-2025-62168</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els15" test_ref="oval:com.tuxcare.clsa:tst:1763543346001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1763397982" version="1">
      <metadata>
        <title>squid34: Fix of CVE-2025-62168</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2025:1763397982" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2025:1763397982" source="CLSA"/>
        <reference ref_id="CVE-2025-62168" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-62168" source="CVE"/>
        <description>- CVE-2025-62168: Redact HTTP authentication credentials in error handling to
  prevent information disclosure</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2025-11-17"/>
          <updated date="2025-11-17"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-209" href="https://cve.tuxcare.com/els/cve/CVE-2025-62168" impact="important" public="20251017">CVE-2025-62168</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1763397982001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1767973696" version="1">
      <metadata>
        <title>git: Fix of CVE-2024-32021</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1767973696" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1767973696" source="CLSA"/>
        <reference ref_id="CVE-2024-32021" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-32021" source="CVE"/>
        <description>- CVE-2024-32021: checking whether the hardlinked destination file matches
  the source file and abort in case it doesn't</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-09"/>
          <updated date="2026-01-09"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cwe="CWE-547" href="https://cve.tuxcare.com/els/cve/CVE-2024-32021" impact="important" public="20240514">CVE-2024-32021</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696001"/>
        <criteria operator="AND">
          <criterion comment="emacs-git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280002"/>
          <criterion comment="emacs-git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280003"/>
        </criteria>
        <criterion comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696002"/>
        <criteria operator="AND">
          <criterion comment="emacs-git-el isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280005"/>
          <criterion comment="emacs-git-el isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280006"/>
        </criteria>
        <criterion comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696003"/>
        <criteria operator="AND">
          <criterion comment="git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280008"/>
          <criterion comment="git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280009"/>
        </criteria>
        <criterion comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696004"/>
        <criteria operator="AND">
          <criterion comment="git-all isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280011"/>
          <criterion comment="git-all isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280012"/>
        </criteria>
        <criterion comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696005"/>
        <criteria operator="AND">
          <criterion comment="git-cvs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280014"/>
          <criterion comment="git-cvs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280015"/>
        </criteria>
        <criterion comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696006"/>
        <criteria operator="AND">
          <criterion comment="git-daemon isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280017"/>
          <criterion comment="git-daemon isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280018"/>
        </criteria>
        <criterion comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696007"/>
        <criteria operator="AND">
          <criterion comment="git-email isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280020"/>
          <criterion comment="git-email isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280021"/>
        </criteria>
        <criterion comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696008"/>
        <criteria operator="AND">
          <criterion comment="git-gui isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280023"/>
          <criterion comment="git-gui isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280024"/>
        </criteria>
        <criterion comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696009"/>
        <criteria operator="AND">
          <criterion comment="git-svn isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280026"/>
          <criterion comment="git-svn isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280027"/>
        </criteria>
        <criterion comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696010"/>
        <criteria operator="AND">
          <criterion comment="gitk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280029"/>
          <criterion comment="gitk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280030"/>
        </criteria>
        <criterion comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696011"/>
        <criteria operator="AND">
          <criterion comment="gitweb isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280032"/>
          <criterion comment="gitweb isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280033"/>
        </criteria>
        <criterion comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1767973696012"/>
        <criteria operator="AND">
          <criterion comment="perl-Git isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1677231280035"/>
          <criterion comment="perl-Git isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1677231280036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1768669128" version="1">
      <metadata>
        <title>kernel: Fix of 39 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1768669128" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128" source="CLSA"/>
        <reference ref_id="CVE-2022-23042" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-23042" source="CVE"/>
        <reference ref_id="CVE-2023-53322" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53322" source="CVE"/>
        <reference ref_id="CVE-2025-37789" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37789" source="CVE"/>
        <reference ref_id="CVE-2023-1380" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-1380" source="CVE"/>
        <reference ref_id="CVE-2022-49918" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49918" source="CVE"/>
        <reference ref_id="CVE-2022-2978" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-2978" source="CVE"/>
        <reference ref_id="CVE-2024-35886" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-35886" source="CVE"/>
        <reference ref_id="CVE-2022-43945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-43945" source="CVE"/>
        <reference ref_id="CVE-2022-50367" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50367" source="CVE"/>
        <reference ref_id="CVE-2022-49870" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49870" source="CVE"/>
        <reference ref_id="CVE-2025-38245" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38245" source="CVE"/>
        <reference ref_id="CVE-2022-50408" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50408" source="CVE"/>
        <reference ref_id="CVE-2022-50252" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50252" source="CVE"/>
        <reference ref_id="CVE-2025-37882" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37882" source="CVE"/>
        <reference ref_id="CVE-2025-37892" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37892" source="CVE"/>
        <reference ref_id="CVE-2022-50419" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50419" source="CVE"/>
        <reference ref_id="CVE-2022-48900" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-48900" source="CVE"/>
        <reference ref_id="CVE-2025-37780" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37780" source="CVE"/>
        <reference ref_id="CVE-2025-38004" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38004" source="CVE"/>
        <reference ref_id="CVE-2025-38556" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38556" source="CVE"/>
        <reference ref_id="CVE-2023-53365" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53365" source="CVE"/>
        <reference ref_id="CVE-2024-58014" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-58014" source="CVE"/>
        <reference ref_id="CVE-2022-49917" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49917" source="CVE"/>
        <reference ref_id="CVE-2023-53321" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53321" source="CVE"/>
        <reference ref_id="CVE-2022-50211" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50211" source="CVE"/>
        <reference ref_id="CVE-2022-50422" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50422" source="CVE"/>
        <reference ref_id="CVE-2025-38051" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38051" source="CVE"/>
        <reference ref_id="CVE-2025-38157" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38157" source="CVE"/>
        <reference ref_id="CVE-2023-53153" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53153" source="CVE"/>
        <reference ref_id="CVE-2025-21772" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-21772" source="CVE"/>
        <reference ref_id="CVE-2022-49907" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49907" source="CVE"/>
        <reference ref_id="CVE-2025-37823" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37823" source="CVE"/>
        <reference ref_id="CVE-2025-39863" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-39863" source="CVE"/>
        <reference ref_id="CVE-2023-53432" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53432" source="CVE"/>
        <reference ref_id="CVE-2023-53373" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53373" source="CVE"/>
        <reference ref_id="CVE-2022-50410" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50410" source="CVE"/>
        <reference ref_id="CVE-2025-39751" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-39751" source="CVE"/>
        <reference ref_id="CVE-2023-53000" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53000" source="CVE"/>
        <reference ref_id="CVE-2022-50258" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50258" source="CVE"/>
        <reference ref_id="CVE-2022-21546" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-21546" source="CVE"/>
        <reference ref_id="CVE-2025-38415" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38415" source="CVE"/>
        <reference ref_id="CVE-2025-38459" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38459" source="CVE"/>
        <description>- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}
- wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}
- spec: merge oraclelinux6els changes
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- mtd: inftlcore: Add error check for inftl_read_oob() {CVE-2025-37892}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- md-raid10: fix KASAN warning {CVE-2022-50211}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014}
- isofs: Prevent the use of too small fid {CVE-2025-37780}
- net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789}
- partitions: mac: fix handling of bogus partition table {CVE-2025-21772}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-01-17"/>
          <updated date="2026-01-17"/>
          <cve cvss2="4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P" cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2022-23042" impact="important" public="20220310">CVE-2022-23042</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-53322" impact="important" public="20250916">CVE-2023-53322</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-37789" impact="important" public="20250501">CVE-2025-37789</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-1380" impact="important" public="20230327">CVE-2023-1380</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-49918" impact="moderate" public="20250501">CVE-2022-49918</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-2978" impact="important" public="20220824">CVE-2022-2978</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2024-35886" impact="important" public="20240519">CVE-2024-35886</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-131" href="https://cve.tuxcare.com/els/cve/CVE-2022-43945" impact="important" public="20221104">CVE-2022-43945</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-50367" impact="important" public="20250917">CVE-2022-50367</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-49870" impact="important" public="20250501">CVE-2022-49870</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-38245" impact="important" public="20250709">CVE-2025-38245</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-50408" impact="important" public="20250918">CVE-2022-50408</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-50252" impact="important" public="20250915">CVE-2022-50252</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-37882" impact="important" public="20250509">CVE-2025-37882</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-37892" impact="important" public="20250520">CVE-2025-37892</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2022-50419" impact="important" public="20250918">CVE-2022-50419</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2022-48900" impact="moderate" public="20240822">CVE-2022-48900</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-37780" impact="important" public="20250501">CVE-2025-37780</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-38004" impact="important" public="20250608">CVE-2025-38004</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-38556" impact="important" public="20250819">CVE-2025-38556</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-53365" impact="moderate" public="20250917">CVE-2023-53365</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2024-58014" impact="important" public="20250227">CVE-2024-58014</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-49917" impact="important" public="20250501">CVE-2022-49917</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-53321" impact="important" public="20250916">CVE-2023-53321</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-50211" impact="important" public="20250618">CVE-2022-50211</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2022-50422" impact="important" public="20251001">CVE-2022-50422</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-38051" impact="important" public="20250618">CVE-2025-38051</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2025-38157" impact="important" public="20250703">CVE-2025-38157</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-53153" impact="important" public="20250915">CVE-2023-53153</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2025-21772" impact="important" public="20250227">CVE-2025-21772</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2022-49907" impact="important" public="20250501">CVE-2022-49907</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-37823" impact="important" public="20250508">CVE-2025-37823</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-39863" impact="important" public="20250919">CVE-2025-39863</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-53432" impact="important" public="20250918">CVE-2023-53432</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-53373" impact="important" public="20250918">CVE-2023-53373</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-50410" impact="important" public="20250918">CVE-2022-50410</cve>
          <cve cvss3="0.0/" href="https://cve.tuxcare.com/els/cve/CVE-2025-39751" impact="unknown" public="20250911">CVE-2025-39751</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2023-53000" impact="important" public="20250327">CVE-2023-53000</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2022-50258" impact="important" public="20250915">CVE-2022-50258</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2022-21546" impact="important" public="20250502">CVE-2022-21546</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2025-38415" impact="important" public="20250725">CVE-2025-38415</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-674" href="https://cve.tuxcare.com/els/cve/CVE-2025-38459" impact="important" public="20250725">CVE-2025-38459</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1768669128001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" test_ref="oval:com.tuxcare.clsa:tst:1768669128011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1770734656" version="1">
      <metadata>
        <title>expat: Fix of CVE-2026-24515</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1770734656" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1770734656" source="CLSA"/>
        <reference ref_id="CVE-2026-24515" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-24515" source="CVE"/>
        <description>- CVE-2026-24515: Fix a null pointer dereference in the XML parser caused by the
  failure to copy user data for unknown encoding handlers</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-10"/>
          <updated date="2026-02-10"/>
          <cve cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cwe="CWE-476" href="https://cve.tuxcare.com/els/cve/CVE-2026-24515" impact="low" public="20260123">CVE-2026-24515</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1770734656001"/>
        <criteria operator="AND">
          <criterion comment="expat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248002"/>
          <criterion comment="expat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248003"/>
        </criteria>
        <criterion comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1770734656002"/>
        <criteria operator="AND">
          <criterion comment="expat-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248005"/>
          <criterion comment="expat-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771238245" version="1">
      <metadata>
        <title>kernel: Fix of 13 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771238245" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1771238245" source="CLSA"/>
        <reference ref_id="CVE-2022-49267" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49267" source="CVE"/>
        <reference ref_id="CVE-2023-53282" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53282" source="CVE"/>
        <reference ref_id="CVE-2023-53145" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53145" source="CVE"/>
        <reference ref_id="CVE-2025-38702" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38702" source="CVE"/>
        <reference ref_id="CVE-2025-39945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-39945" source="CVE"/>
        <reference ref_id="CVE-2025-38699" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38699" source="CVE"/>
        <reference ref_id="CVE-2023-53063" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53063" source="CVE"/>
        <reference ref_id="CVE-2025-39691" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-39691" source="CVE"/>
        <reference ref_id="CVE-2023-53521" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53521" source="CVE"/>
        <reference ref_id="CVE-2025-38680" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38680" source="CVE"/>
        <reference ref_id="CVE-2023-53675" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53675" source="CVE"/>
        <reference ref_id="CVE-2023-53265" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53265" source="CVE"/>
        <reference ref_id="CVE-2025-38685" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38685" source="CVE"/>
        <reference ref_id="CVE-2025-39760" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-39760" source="CVE"/>
        <description>- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}
- cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}
- scsi: bfa: Double-free fix {CVE-2025-38699}
- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521}
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675}
- usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760}
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}
- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}
- mmc: core: replace sprintf() with scnprintf() for sysfs output {CVE-2022-49267}
- ubi: ensure that VID header offset + VID header size &lt;= alloc, size {CVE-2023-53265}
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write {CVE-2023-53282}
- Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" {CVE-2023-53063}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-53063}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-16"/>
          <updated date="2026-02-16"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2022-49267" impact="important" public="20250226">CVE-2022-49267</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-53282" impact="important" public="20250916">CVE-2023-53282</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-53145" impact="important" public="20250510">CVE-2023-53145</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2025-38702" impact="important" public="20250904">CVE-2025-38702</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-39945" impact="important" public="20251004">CVE-2025-39945</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-415" href="https://cve.tuxcare.com/els/cve/CVE-2025-38699" impact="important" public="20250904">CVE-2025-38699</cve>
          <cve cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-53063" impact="moderate" public="20250502">CVE-2023-53063</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2025-39691" impact="important" public="20250905">CVE-2025-39691</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-53521" impact="important" public="20251001">CVE-2023-53521</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-38680" impact="important" public="20250904">CVE-2025-38680</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-53675" impact="important" public="20251007">CVE-2023-53675</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2023-53265" impact="important" public="20250916">CVE-2023-53265</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2025-38685" impact="important" public="20250904">CVE-2025-38685</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-39760" impact="important" public="20250911">CVE-2025-39760</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1771238245001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" test_ref="oval:com.tuxcare.clsa:tst:1771238245011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771580716" version="1">
      <metadata>
        <title>glib2: Fix of CVE-2025-14087</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771580716" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1771580716" source="CLSA"/>
        <reference ref_id="CVE-2025-14087" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-14087" source="CVE"/>
        <description>- CVE-2025-14087: Fix integer overflow in GVariant parser leading to heap
  corruption via buffer underflow when processing malicious input strings</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-20"/>
          <updated date="2026-02-20"/>
          <cve cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2025-14087" impact="critical" public="20251210">CVE-2025-14087</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1771580716001"/>
        <criteria operator="AND">
          <criterion comment="glib2 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923002"/>
          <criterion comment="glib2 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923003"/>
        </criteria>
        <criterion comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1771580716002"/>
        <criteria operator="AND">
          <criterion comment="glib2-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923005"/>
          <criterion comment="glib2-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923006"/>
        </criteria>
        <criterion comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1771580716003"/>
        <criteria operator="AND">
          <criterion comment="glib2-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923008"/>
          <criterion comment="glib2-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923009"/>
        </criteria>
        <criterion comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els6" test_ref="oval:com.tuxcare.clsa:tst:1771580716004"/>
        <criteria operator="AND">
          <criterion comment="glib2-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1623075923011"/>
          <criterion comment="glib2-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1623075923012"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1771926895" version="1">
      <metadata>
        <title>python: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1771926895" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1771926895" source="CLSA"/>
        <reference ref_id="CVE-2018-1061" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-1061" source="CVE"/>
        <reference ref_id="CVE-2018-1060" ref_url="https://cve.tuxcare.com/els/cve/CVE-2018-1060" source="CVE"/>
        <description>- CVE-2018-1060: fix catastrophic backtracking in APOP method, prevent denial of
  service, add input validation and enforce backtracking limits
- CVE-2018-1061: fix catastrophic backtracking in the difflib.IS_LINE_JUNK method</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-02-24"/>
          <updated date="2026-02-24"/>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2018-1061" impact="important" public="20180619">CVE-2018-1061</cve>
          <cve cvss2="5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2018-1060" impact="important" public="20180618">CVE-2018-1060</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1771926895001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1771926895002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1771926895003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1771926895004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1771926895005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1771926895006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772454796" version="1">
      <metadata>
        <title>zlib: Fix of CVE-2016-9843</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772454796" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1772454796" source="CLSA"/>
        <reference ref_id="CVE-2016-9843" ref_url="https://cve.tuxcare.com/els/cve/CVE-2016-9843" source="CVE"/>
        <description>- CVE-2016-9843: avoid pre-decrement of pointer in big-endian CRC calculation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Critical</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-02"/>
          <updated date="2026-03-02"/>
          <cve cvss2="7.5/AV:N/AC:L/Au:N/C:P/I:P/A:P" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2016-9843" impact="critical" public="20170523">CVE-2016-9843</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1772454796001"/>
        <criteria operator="AND">
          <criterion comment="minizip isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231002"/>
          <criterion comment="minizip isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231003"/>
        </criteria>
        <criterion comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1772454796002"/>
        <criteria operator="AND">
          <criterion comment="minizip-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231005"/>
          <criterion comment="minizip-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231006"/>
        </criteria>
        <criterion comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1772454796003"/>
        <criteria operator="AND">
          <criterion comment="zlib isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231008"/>
          <criterion comment="zlib isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231009"/>
        </criteria>
        <criterion comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1772454796004"/>
        <criteria operator="AND">
          <criterion comment="zlib-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231011"/>
          <criterion comment="zlib-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231012"/>
        </criteria>
        <criterion comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els4" test_ref="oval:com.tuxcare.clsa:tst:1772454796005"/>
        <criteria operator="AND">
          <criterion comment="zlib-static isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1652706231014"/>
          <criterion comment="zlib-static isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1652706231015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1772577130" version="1">
      <metadata>
        <title>python: Fix of CVE-2025-8194</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1772577130" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1772577130" source="CLSA"/>
        <reference ref_id="CVE-2025-8194" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-8194" source="CVE"/>
        <description>- CVE-2025-8194: tarfile now validates archives to ensure member offsets are
  non-negative</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-03"/>
          <updated date="2026-03-03"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-835" href="https://cve.tuxcare.com/els/cve/CVE-2025-8194" impact="important" public="20250728">CVE-2025-8194</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1772577130001"/>
        <criteria operator="AND">
          <criterion comment="python isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357002"/>
          <criterion comment="python isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357003"/>
        </criteria>
        <criterion comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1772577130002"/>
        <criteria operator="AND">
          <criterion comment="python-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357005"/>
          <criterion comment="python-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357006"/>
        </criteria>
        <criterion comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1772577130003"/>
        <criteria operator="AND">
          <criterion comment="python-libs isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357008"/>
          <criterion comment="python-libs isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357009"/>
        </criteria>
        <criterion comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1772577130004"/>
        <criteria operator="AND">
          <criterion comment="python-test isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357011"/>
          <criterion comment="python-test isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357012"/>
        </criteria>
        <criterion comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1772577130005"/>
        <criteria operator="AND">
          <criterion comment="python-tools isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357014"/>
          <criterion comment="python-tools isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357015"/>
        </criteria>
        <criterion comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els17" test_ref="oval:com.tuxcare.clsa:tst:1772577130006"/>
        <criteria operator="AND">
          <criterion comment="tkinter isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1616001357017"/>
          <criterion comment="tkinter isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1616001357018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773043650" version="1">
      <metadata>
        <title>kernel: Fix of 10 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773043650" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1773043650" source="CLSA"/>
        <reference ref_id="CVE-2022-50497" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50497" source="CVE"/>
        <reference ref_id="CVE-2023-53622" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53622" source="CVE"/>
        <reference ref_id="CVE-2022-49865" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-49865" source="CVE"/>
        <reference ref_id="CVE-2023-53569" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53569" source="CVE"/>
        <reference ref_id="CVE-2025-37749" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-37749" source="CVE"/>
        <reference ref_id="CVE-2022-50315" ref_url="https://cve.tuxcare.com/els/cve/CVE-2022-50315" source="CVE"/>
        <reference ref_id="CVE-2023-52927" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-52927" source="CVE"/>
        <reference ref_id="CVE-2023-53395" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53395" source="CVE"/>
        <reference ref_id="CVE-2024-36934" ref_url="https://cve.tuxcare.com/els/cve/CVE-2024-36934" source="CVE"/>
        <reference ref_id="CVE-2023-53506" ref_url="https://cve.tuxcare.com/els/cve/CVE-2023-53506" source="CVE"/>
        <description>- ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer {CVE-2023-53395}
- net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749}
- ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315}
- ext2: Check block size validity during mount {CVE-2023-53569}
- gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622}
- netfilter: allow exp not to be removed in nf_ct_find_expectation {CVE-2023-52927}
- bna: ensure the copied buf is NUL terminated {CVE-2024-36934}
- new helper: memdup_user_nul() {CVE-2024-36934}
- udf: Do not bother merging very long extents {CVE-2023-53506}
- ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network {CVE-2022-49865}
- binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-09"/>
          <updated date="2026-03-09"/>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2022-50497" impact="important" public="20251004">CVE-2022-50497</cve>
          <cve cvss3="7.0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-362" href="https://cve.tuxcare.com/els/cve/CVE-2023-53622" impact="important" public="20251007">CVE-2023-53622</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-909" href="https://cve.tuxcare.com/els/cve/CVE-2022-49865" impact="important" public="20250501">CVE-2022-49865</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-53569" impact="important" public="20251004">CVE-2023-53569</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-37749" impact="important" public="20250501">CVE-2025-37749</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2022-50315" impact="important" public="20250915">CVE-2022-50315</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2023-52927" impact="important" public="20250314">CVE-2023-52927</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-129" href="https://cve.tuxcare.com/els/cve/CVE-2023-53395" impact="important" public="20250918">CVE-2023-53395</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2024-36934" impact="important" public="20240530">CVE-2024-36934</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2023-53506" impact="important" public="20251001">CVE-2023-53506</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1773043650001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" test_ref="oval:com.tuxcare.clsa:tst:1773043650011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773506968" version="1">
      <metadata>
        <title>java-1.8.0-openjdk: Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773506968" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1773506968" source="CLSA"/>
        <reference ref_id="CVE-2026-21925" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-21925" source="CVE"/>
        <reference ref_id="CVE-2026-21933" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-21933" source="CVE"/>
        <reference ref_id="CVE-2026-21945" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-21945" source="CVE"/>
        <reference ref_id="CVE-2025-53066" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-53066" source="CVE"/>
        <reference ref_id="CVE-2025-53057" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-53057" source="CVE"/>
        <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u482-b08. That fixes following CVEs:
- CVE-2025-53057: Security: enforce proper access control in certificate
  handling to prevent data tampering
- CVE-2025-53066: JAXP: restrict data access in Path Factory processing to
  prevent information disclosure
- CVE-2026-21925: RMI: tighten access controls on JMX connections
- CVE-2026-21933: Networking: harden HttpServer request parsing to prevent
  cross-context data manipulation
- CVE-2026-21945: Security: add resource consumption limits in certificate
  parsing to prevent DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-14"/>
          <updated date="2026-03-14"/>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-322" href="https://cve.tuxcare.com/els/cve/CVE-2026-21925" impact="moderate" public="20260120">CVE-2026-21925</cve>
          <cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://cve.tuxcare.com/els/cve/CVE-2026-21933" impact="moderate" public="20260120">CVE-2026-21933</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-295" href="https://cve.tuxcare.com/els/cve/CVE-2026-21945" impact="important" public="20260120">CVE-2026-21945</cve>
          <cve cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://cve.tuxcare.com/els/cve/CVE-2025-53066" impact="moderate" public="20251021">CVE-2025-53066</cve>
          <cve cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cwe="CWE-838" href="https://cve.tuxcare.com/els/cve/CVE-2025-53057" impact="moderate" public="20251021">CVE-2025-53057</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="java-1.8.0-openjdk is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968001"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184002"/>
          <criterion comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184003"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968002"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184005"/>
          <criterion comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184006"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968003"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184008"/>
          <criterion comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184009"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968004"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184011"/>
          <criterion comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184012"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968005"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184014"/>
          <criterion comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184015"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968006"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184017"/>
          <criterion comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184018"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968007"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184020"/>
          <criterion comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184021"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968008"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184023"/>
          <criterion comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184024"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968009"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184026"/>
          <criterion comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184027"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968010"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184029"/>
          <criterion comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184030"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968011"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184032"/>
          <criterion comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184033"/>
        </criteria>
        <criterion comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" test_ref="oval:com.tuxcare.clsa:tst:1773506968012"/>
        <criteria operator="AND">
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262184035"/>
          <criterion comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262184036"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1773506143" version="1">
      <metadata>
        <title>vim: Fix of CVE-2026-26269</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1773506143" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1773506143" source="CLSA"/>
        <reference ref_id="CVE-2026-26269" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-26269" source="CVE"/>
        <description>- CVE-2026-26269: fix stack-based buffer overflow in NetBeans integration that
  could lead to a crash or arbitrary code execution via a malicious server</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-14"/>
          <updated date="2026-03-14"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-121" href="https://cve.tuxcare.com/els/cve/CVE-2026-26269" impact="important" public="20260213">CVE-2026-26269</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" test_ref="oval:com.tuxcare.clsa:tst:1773506143001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" test_ref="oval:com.tuxcare.clsa:tst:1773506143002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" test_ref="oval:com.tuxcare.clsa:tst:1773506143003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" test_ref="oval:com.tuxcare.clsa:tst:1773506143004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" test_ref="oval:com.tuxcare.clsa:tst:1773506143005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1774021165" version="1">
      <metadata>
        <title>expat: Fix of CVE-2026-25210</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1774021165" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1774021165" source="CLSA"/>
        <reference ref_id="CVE-2026-25210" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-25210" source="CVE"/>
        <description>- CVE-2026-25210: fix memory corruption via integer overflow in doContent
  function during tag buffer reallocation</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-20"/>
          <updated date="2026-03-20"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2026-25210" impact="important" public="20260130">CVE-2026-25210</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1774021165001"/>
        <criteria operator="AND">
          <criterion comment="expat isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248002"/>
          <criterion comment="expat isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248003"/>
        </criteria>
        <criterion comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els7" test_ref="oval:com.tuxcare.clsa:tst:1774021165002"/>
        <criteria operator="AND">
          <criterion comment="expat-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1660762248005"/>
          <criterion comment="expat-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1660762248006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1774276586" version="1">
      <metadata>
        <title>curl: Fix of CVE-2026-3784</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1774276586" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1774276586" source="CLSA"/>
        <reference ref_id="CVE-2026-3784" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-3784" source="CVE"/>
        <description>- CVE-2026-3784: fix proxy connection reuse with different credentials
- update outdated timestamps in test 046</description>
        <advisory from="packager@tuxcare.com">
          <severity>Moderate</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-23"/>
          <updated date="2026-03-23"/>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-305" href="https://cve.tuxcare.com/els/cve/CVE-2026-3784" impact="moderate" public="20260311">CVE-2026-3784</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1774276586001"/>
        <criteria operator="AND">
          <criterion comment="curl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009002"/>
          <criterion comment="curl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009003"/>
        </criteria>
        <criterion comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1774276586002"/>
        <criteria operator="AND">
          <criterion comment="libcurl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009005"/>
          <criterion comment="libcurl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009006"/>
        </criteria>
        <criterion comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1774276586003"/>
        <criteria operator="AND">
          <criterion comment="libcurl-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1608724009008"/>
          <criterion comment="libcurl-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1608724009009"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1774432816" version="1">
      <metadata>
        <title>vim: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1774432816" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1774432816" source="CLSA"/>
        <reference ref_id="CVE-2026-28417" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-28417" source="CVE"/>
        <reference ref_id="CVE-2026-28421" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-28421" source="CVE"/>
        <description>- CVE-2026-28417: fix OS command injection in netrw plugin when handling
  specially crafted URLs such as scp://
- CVE-2026-28421: fix heap-buffer-overflow and crash when recovering from a
  maliciously crafted Vim swap file</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-25"/>
          <updated date="2026-03-25"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-86" href="https://cve.tuxcare.com/els/cve/CVE-2026-28417" impact="important" public="20260227">CVE-2026-28417</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cwe="CWE-20" href="https://cve.tuxcare.com/els/cve/CVE-2026-28421" impact="important" public="20260227">CVE-2026-28421</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" test_ref="oval:com.tuxcare.clsa:tst:1774432816001"/>
        <criteria operator="AND">
          <criterion comment="vim-X11 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979002"/>
          <criterion comment="vim-X11 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979003"/>
        </criteria>
        <criterion comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" test_ref="oval:com.tuxcare.clsa:tst:1774432816002"/>
        <criteria operator="AND">
          <criterion comment="vim-common isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979005"/>
          <criterion comment="vim-common isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979006"/>
        </criteria>
        <criterion comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" test_ref="oval:com.tuxcare.clsa:tst:1774432816003"/>
        <criteria operator="AND">
          <criterion comment="vim-enhanced isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979008"/>
          <criterion comment="vim-enhanced isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979009"/>
        </criteria>
        <criterion comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" test_ref="oval:com.tuxcare.clsa:tst:1774432816004"/>
        <criteria operator="AND">
          <criterion comment="vim-filesystem isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979011"/>
          <criterion comment="vim-filesystem isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979012"/>
        </criteria>
        <criterion comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" test_ref="oval:com.tuxcare.clsa:tst:1774432816005"/>
        <criteria operator="AND">
          <criterion comment="vim-minimal isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1649170979014"/>
          <criterion comment="vim-minimal isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1649170979015"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1774946829" version="1">
      <metadata>
        <title>squid: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1774946829" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1774946829" source="CLSA"/>
        <reference ref_id="CVE-2026-33526" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-33526" source="CVE"/>
        <reference ref_id="CVE-2026-32748" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-32748" source="CVE"/>
        <reference ref_id="CVE-2026-33515" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-33515" source="CVE"/>
        <description>- CVE-2026-33526: fix heap Use-After-Free in ICP traffic handling causing DoS
- CVE-2026-33515: fix out-of-bounds read in ICP message handling leaking
  sensitive information
- CVE-2026-32748: fix HttpRequest lifetime in ICP v3 queries preventing
  Use-After-Free DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-03-31"/>
          <updated date="2026-03-31"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2026-33526" impact="important" public="20260326">CVE-2026-33526</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-413" href="https://cve.tuxcare.com/els/cve/CVE-2026-32748" impact="important" public="20260326">CVE-2026-32748</cve>
          <cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2026-33515" impact="moderate" public="20260326">CVE-2026-33515</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els16" test_ref="oval:com.tuxcare.clsa:tst:1774946829001"/>
        <criteria operator="AND">
          <criterion comment="squid isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650575956002"/>
          <criterion comment="squid isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650575956003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1775148022" version="1">
      <metadata>
        <title>binutils: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1775148022" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1775148022" source="CLSA"/>
        <reference ref_id="CVE-2025-66863" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-66863" source="CVE"/>
        <reference ref_id="CVE-2025-66862" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-66862" source="CVE"/>
        <reference ref_id="CVE-2025-66865" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-66865" source="CVE"/>
        <description>- CVE-2025-66862: fix heap-buffer-overflow in gnu_special in cplus-dem.c
- CVE-2025-66863: fix SEGV in d_discriminator in cp-demangle.c
- CVE-2025-66865: fix stack overflow in d_print_comp in cp-demangle.c</description>
        <advisory from="packager@tuxcare.com">
          <severity>Low</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-02"/>
          <updated date="2026-04-02"/>
          <cve cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-66863" impact="low" public="20251229">CVE-2025-66863</cve>
          <cve cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-66862" impact="low" public="20251229">CVE-2025-66862</cve>
          <cve cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cwe="CWE-121" href="https://cve.tuxcare.com/els/cve/CVE-2025-66865" impact="low" public="20251229">CVE-2025-66865</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1775148022001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els10" test_ref="oval:com.tuxcare.clsa:tst:1775148022002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1775062580" version="1">
      <metadata>
        <title>squid34: Fix of 2 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1775062580" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1775062580" source="CLSA"/>
        <reference ref_id="CVE-2026-33526" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-33526" source="CVE"/>
        <reference ref_id="CVE-2026-32748" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-32748" source="CVE"/>
        <description>- CVE-2026-33526: fix heap Use-After-Free in ICP traffic handling causing DoS
- CVE-2026-32748: fix HttpRequest lifetime in ICP v3 queries preventing
  Use-After-Free DoS</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-01"/>
          <updated date="2026-04-01"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2026-33526" impact="important" public="20260326">CVE-2026-33526</cve>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cwe="CWE-413" href="https://cve.tuxcare.com/els/cve/CVE-2026-32748" impact="important" public="20260326">CVE-2026-32748</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els12" test_ref="oval:com.tuxcare.clsa:tst:1775062580001"/>
        <criteria operator="AND">
          <criterion comment="squid34 isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632262221002"/>
          <criterion comment="squid34 isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632262221003"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1775725743" version="1">
      <metadata>
        <title>ImageMagick: Fix of 3 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1775725743" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1775725743" source="CLSA"/>
        <reference ref_id="CVE-2025-66628" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-66628" source="CVE"/>
        <reference ref_id="CVE-2026-28494" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-28494" source="CVE"/>
        <reference ref_id="CVE-2026-28693" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-28693" source="CVE"/>
        <description>- CVE-2025-66628: fix integer overflow in TIM parser
- CVE-2026-28494: fix stack buffer overflow in morphology kernel parsing
- CVE-2026-28693: fix integer overflow in DIB coder</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-09"/>
          <updated date="2026-04-09"/>
          <cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2025-66628" impact="important" public="20251210">CVE-2025-66628</cve>
          <cve cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cwe="CWE-120" href="https://cve.tuxcare.com/els/cve/CVE-2026-28494" impact="important" public="20260309">CVE-2026-28494</cve>
          <cve cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-190" href="https://cve.tuxcare.com/els/cve/CVE-2026-28693" impact="important" public="20260309">CVE-2026-28693</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="ImageMagick is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1775725743001"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265002"/>
          <criterion comment="ImageMagick isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265003"/>
        </criteria>
        <criterion comment="ImageMagick-c++ is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1775725743002"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-c++ isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265005"/>
          <criterion comment="ImageMagick-c++ isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265006"/>
        </criteria>
        <criterion comment="ImageMagick-c++-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1775725743003"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-c++-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265008"/>
          <criterion comment="ImageMagick-c++-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265009"/>
        </criteria>
        <criterion comment="ImageMagick-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1775725743004"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265011"/>
          <criterion comment="ImageMagick-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265012"/>
        </criteria>
        <criterion comment="ImageMagick-doc is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1775725743005"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265014"/>
          <criterion comment="ImageMagick-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265015"/>
        </criteria>
        <criterion comment="ImageMagick-perl is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" test_ref="oval:com.tuxcare.clsa:tst:1775725743006"/>
        <criteria operator="AND">
          <criterion comment="ImageMagick-perl isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1617641265017"/>
          <criterion comment="ImageMagick-perl isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1617641265018"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1775722568" version="1">
      <metadata>
        <title>binutils: Fix of 4 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1775722568" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1775722568" source="CLSA"/>
        <reference ref_id="CVE-2026-3442" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-3442" source="CVE"/>
        <reference ref_id="CVE-2025-5244" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-5244" source="CVE"/>
        <reference ref_id="CVE-2026-3441" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-3441" source="CVE"/>
        <reference ref_id="CVE-2025-5245" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-5245" source="CVE"/>
        <description>- CVE-2025-5244: fix NULL pointer dereference in elf_gc_sweep for empty section groups
- CVE-2025-5245: fix memory corruption in debug_type_samep incorrect NULL check
- CVE-2026-3441: fix out-of-bounds read in xcoff_link_add_symbols x_scnlen bounds check
- CVE-2026-3442: fix out-of-bounds read in xcoff_link_add_symbols missing r_symndx bounds check</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-09"/>
          <updated date="2026-04-09"/>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2026-3442" impact="important" public="20260316">CVE-2026-3442</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2025-5244" impact="important" public="20250527">CVE-2025-5244</cve>
          <cve cvss3="7.1000000000000005/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" cwe="CWE-125" href="https://cve.tuxcare.com/els/cve/CVE-2026-3441" impact="important" public="20260316">CVE-2026-3441</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-119" href="https://cve.tuxcare.com/els/cve/CVE-2025-5245" impact="important" public="20250527">CVE-2025-5245</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1775722568001"/>
        <criteria operator="AND">
          <criterion comment="binutils isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819002"/>
          <criterion comment="binutils isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819003"/>
        </criteria>
        <criterion comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els11" test_ref="oval:com.tuxcare.clsa:tst:1775722568002"/>
        <criteria operator="AND">
          <criterion comment="binutils-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1638803819005"/>
          <criterion comment="binutils-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1638803819006"/>
        </criteria>
      </criteria>
    </definition>
    <definition class="patch" id="oval:com.tuxcare.clsa:def:1775745943" version="1">
      <metadata>
        <title>kernel: Fix of 5 CVEs</title>
        <affected family="unix">
          <platform>Community Enterprise Operating System 6</platform>
        </affected>
        <reference ref_id="CLSA-2026:1775745943" ref_url="https://cve.tuxcare.com/els/releases/CLSA-2026:1775745943" source="CLSA"/>
        <reference ref_id="CVE-2025-38348" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-38348" source="CVE"/>
        <reference ref_id="CVE-2026-23089" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-23089" source="CVE"/>
        <reference ref_id="CVE-2026-23074" ref_url="https://cve.tuxcare.com/els/cve/CVE-2026-23074" source="CVE"/>
        <reference ref_id="CVE-2025-39828" ref_url="https://cve.tuxcare.com/els/cve/CVE-2025-39828" source="CVE"/>
        <description>- net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623}
- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}
- atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). {CVE-2025-39828}
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() {CVE-2025-38348}</description>
        <advisory from="packager@tuxcare.com">
          <severity>Important</severity>
          <rights>TuxCare License Agreement</rights>
          <issued date="2026-04-09"/>
          <updated date="2026-04-09"/>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-787" href="https://cve.tuxcare.com/els/cve/CVE-2025-38348" impact="important" public="20250710">CVE-2025-38348</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2026-23089" impact="important" public="20260204">CVE-2026-23089</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cwe="CWE-416" href="https://cve.tuxcare.com/els/cve/CVE-2026-23074" impact="important" public="20260204">CVE-2026-23074</cve>
          <cve cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://cve.tuxcare.com/els/cve/CVE-2025-39828" impact="important" public="20250916">CVE-2025-39828</cve>
          <affected_cpe_list>
            <cpe>cpe:/o:centos:linux:6:GA</cpe>
          </affected_cpe_list>
        </advisory>
      </metadata>
      <criteria operator="OR">
        <criterion comment="CentOS 6.10 with ELS isn't installed" test_ref="oval:com.tuxcare.clsa:tst:1611743864001"/>
        <criterion comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31 (or unknown) is currently running" test_ref="oval:com.tuxcare.clsa:tst:1775745943001"/>
        <criterion comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943002"/>
        <criteria operator="AND">
          <criterion comment="kernel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075003"/>
          <criterion comment="kernel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075004"/>
        </criteria>
        <criterion comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943003"/>
        <criteria operator="AND">
          <criterion comment="kernel-abi-whitelists isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912002"/>
          <criterion comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912003"/>
        </criteria>
        <criterion comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943004"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075006"/>
          <criterion comment="kernel-debug isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075007"/>
        </criteria>
        <criterion comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943005"/>
        <criteria operator="AND">
          <criterion comment="kernel-debug-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075009"/>
          <criterion comment="kernel-debug-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075010"/>
        </criteria>
        <criterion comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943006"/>
        <criteria operator="AND">
          <criterion comment="kernel-devel isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075012"/>
          <criterion comment="kernel-devel isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075013"/>
        </criteria>
        <criterion comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943007"/>
        <criteria operator="AND">
          <criterion comment="kernel-doc isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1632261912005"/>
          <criterion comment="kernel-doc isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1632261912006"/>
        </criteria>
        <criterion comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943008"/>
        <criteria operator="AND">
          <criterion comment="kernel-firmware isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075015"/>
          <criterion comment="kernel-firmware isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075016"/>
        </criteria>
        <criterion comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943009"/>
        <criteria operator="AND">
          <criterion comment="kernel-headers isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075018"/>
          <criterion comment="kernel-headers isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075019"/>
        </criteria>
        <criterion comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943010"/>
        <criteria operator="AND">
          <criterion comment="perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075021"/>
          <criterion comment="perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075022"/>
        </criteria>
        <criterion comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" test_ref="oval:com.tuxcare.clsa:tst:1775745943011"/>
        <criteria operator="AND">
          <criterion comment="python-perf isn't signed with CentOS 6 key" test_ref="oval:com.tuxcare.clsa:tst:1650576075024"/>
          <criterion comment="python-perf isn't signed with Tuxcare ELS key" test_ref="oval:com.tuxcare.clsa:tst:1650576075025"/>
        </criteria>
      </criteria>
    </definition>
  </definitions>
  <tests>
    <ind-def:textfilecontent54_test check="none satisfy" check_existence="none_exist" comment="CentOS 6.10 with ELS isn't installed" id="oval:com.tuxcare.clsa:tst:1611743864001" version="1">
      <ind-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864001"/>
    </ind-def:textfilecontent54_test>
    <red-def:rpminfo_test check="at least one" comment="sudo is earlier than 0:1.8.6p3-30.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1611743864002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sudo isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1611743864003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sudo isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1611743864004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo-devel is earlier than 0:1.8.6p3-30.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1611743864005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sudo-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1611743864006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sudo-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1611743864007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo is earlier than 0:1.8.6p3-32.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1625650209001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1625650209001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo-devel is earlier than 0:1.8.6p3-32.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1625650209002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1625650209002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bash is earlier than 0:4.1.2-48.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1650910003001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650910003001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650910003001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bash isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650910003002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650910003001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bash isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650910003003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650910003001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bash-doc is earlier than 0:4.1.2-48.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1650910003004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650910003004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650910003001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bash-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650910003005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650910003004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bash-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650910003006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650910003004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gzip is earlier than 0:1.3.12-24.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1653005178001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653005178001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653005178001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gzip isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1653005178002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653005178001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gzip isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1653005178003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653005178001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261610001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261610001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261610002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261610003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261610004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261610001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-chroot isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261610005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-chroot isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261610006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261610007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261610007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261610008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261610009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261610010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261610007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-libs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261610011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-libs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261610012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261610013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261610001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-sdb isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261610014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-sdb isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261610015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 32:9.8.2-0.68.rc16_10.9.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261610016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261610001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-utils isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261610017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="bind-utils isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261610018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261705001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261705001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261705002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261705001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261705003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261705001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261705004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261705001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261705005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261705001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261705006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261705001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637070791001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637070791001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637070791002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637070791001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637070791003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637070791003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637070791004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637070791003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637070791005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637070791001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637070791006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637070791001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649331579001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649331579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649331579002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649331579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649331579003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649331579003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649331579004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649331579003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649331579005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649331579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649331579006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649331579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1657561196001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561196001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1657561196002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561196001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1657561196003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561196003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1657561196004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561196003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1657561196005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561196001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1657561196006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561196001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="busybox is earlier than 1:1.15.1-21.el6_6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1650376937001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650376937001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="busybox isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650376937002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="busybox isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650376937003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="busybox-petitboot is earlier than 1:1.15.1-21.el6_6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1650376937004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650376937001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="busybox-petitboot isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650376937005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="busybox-petitboot isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650376937006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-71.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633601543001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633601543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633601543002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633601543003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-71.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633601543004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633601543004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633601543005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633601543006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-71.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633601543007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633601543007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd-manual isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633601543008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd-manual isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633601543009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-71.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633601543010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633601543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd-tools isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633601543011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="httpd-tools isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633601543012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-71.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633601543013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633601543013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="mod_ssl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633601543014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="mod_ssl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633601543015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745216001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745216001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745216002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745216002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745216003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745216003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745216004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745216001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745216005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745216005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1648136177001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648136177001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1648136177002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648136177002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1648136177003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648136177003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1648136177004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648136177001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1648136177005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648136177005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1656447241001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656447241001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1656447241002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656447241002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1656447241003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656447241003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1656447241004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656447241001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1656447241005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656447241005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-55.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724009001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724009001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="curl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724009002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="curl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724009003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-55.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724009004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724009001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libcurl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724009005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libcurl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724009006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-55.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724009007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724009001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libcurl-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724009008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libcurl-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724009009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-56.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1617285762001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617285762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-56.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1617285762002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617285762002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-56.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1617285762003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617285762002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-57.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261872001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261872001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-57.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261872002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261872002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-57.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261872003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261872002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-58.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261944001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261944001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-58.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261944002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261944002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-58.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261944003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261944002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262236001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262236001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262236002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262236002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262236003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262236002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1656961923001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656961923001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1656961923002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656961923002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1656961923003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656961923002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-imapd is earlier than 0:2.3.16-15.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654107183001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654107183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-imapd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654107183002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-imapd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654107183003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-imapd-devel is earlier than 0:2.3.16-15.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654107183004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654107183004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-imapd-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654107183005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-imapd-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654107183006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-imapd-utils is earlier than 0:2.3.16-15.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654107183007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654107183001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-imapd-utils isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654107183008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-imapd-utils isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654107183009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654107183007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dhclient is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075541001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075541001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhclient isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075541002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhclient isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075541003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dhcp is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075541004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075541001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhcp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075541005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhcp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075541006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dhcp-common is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075541007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075541001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhcp-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075541008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhcp-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075541009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dhcp-devel is earlier than 12:4.1.1-64.P1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075541010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075541010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhcp-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075541011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dhcp-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075541012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075541010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot is earlier than 1:2.0.9-23.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634573745001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634573745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1634573745002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1634573745003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-devel is earlier than 1:2.0.9-23.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634573745004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634573745001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1634573745005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1634573745006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-mysql is earlier than 1:2.0.9-23.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634573745007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634573745007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-mysql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1634573745008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-mysql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1634573745009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-pgsql is earlier than 1:2.0.9-23.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634573745010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634573745007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-pgsql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1634573745011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-pgsql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1634573745012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-pigeonhole is earlier than 1:2.0.9-23.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634573745013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634573745007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-pigeonhole isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1634573745014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dovecot-pigeonhole isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1634573745015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gd is earlier than 0:2.0.35-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1635439636001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1635439636001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1635439636002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1635439636003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gd-devel is earlier than 0:2.0.35-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1635439636004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1635439636001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gd-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1635439636005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gd-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1635439636006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gd-progs is earlier than 0:2.0.35-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1635439636007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1635439636007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gd-progs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1635439636008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gd-progs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1635439636009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1635439636007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2 is earlier than 0:2.28.8-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075923001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075923001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075923002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075923003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-devel is earlier than 0:2.28.8-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075923004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075923001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075923005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075923006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-doc is earlier than 0:2.28.8-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075923007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075923007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075923008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075923009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-static is earlier than 0:2.28.8-12.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1623075923010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1623075923010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2-static isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1623075923011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glib2-static isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1623075923012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1642084196001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642084196001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1642084196002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642084196001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1642084196003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642084196003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1642084196004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642084196004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-headers isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-headers isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-static isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-static isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-utils isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="glibc-utils isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.213.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629395067019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629395067004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nscd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1629395067020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nscd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1629395067021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637583639007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637583639002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643818516007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643818516002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1648138117007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1648138117002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1624372464001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1624372464001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="hivex isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1624372464002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="hivex isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1624372464003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="hivex-devel is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1624372464004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1624372464001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="hivex-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1624372464005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="hivex-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1624372464006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ocaml-hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1624372464007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1624372464007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ocaml-hivex isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1624372464008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ocaml-hivex isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1624372464009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ocaml-hivex-devel is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1624372464010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1624372464001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ocaml-hivex-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1624372464011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ocaml-hivex-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1624372464012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1624372464013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1624372464007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-hivex isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1624372464014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-hivex isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1624372464015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-hivex is earlier than 0:1.3.3-4.4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1624372464016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1624372464007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-hivex isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1624372464017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-hivex isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1624372464018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1624372464016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.2.el6 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1650576075001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075008"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-debug-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-debug-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075008"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-firmware isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-firmware isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-headers isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-headers isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perf isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perf isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.2.el6" id="oval:com.tuxcare.clsa:tst:1650576075023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650576075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-perf isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650576075024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-perf isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650576075025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.3.el6 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1632261664001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.3.el6" id="oval:com.tuxcare.clsa:tst:1632261664009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261664002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.5.el6 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1632261839001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.5.el6" id="oval:com.tuxcare.clsa:tst:1632261839008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261839002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.6.el6" id="oval:com.tuxcare.clsa:tst:1632261912001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261912001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-abi-whitelists isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261912002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-abi-whitelists isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261912003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.6.el6" id="oval:com.tuxcare.clsa:tst:1632261912004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261912001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261912005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="kernel-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261912006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.6.el6" id="oval:com.tuxcare.clsa:tst:1632261912007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261912001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.7.el6 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1632261987001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.7.el6" id="oval:com.tuxcare.clsa:tst:1632261987008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261987002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1632262296001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6" id="oval:com.tuxcare.clsa:tst:1632262296008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262296002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1650986589001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1650986589008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650986589002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1650377052001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1650377052008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650377052002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-devel is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-gssapi is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-gssapi isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-gssapi isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-ldap is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-ldap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-ldap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-lib is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-lib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-lib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-md5 is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-md5 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-md5 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-ntlm is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-ntlm isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-ntlm isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-plain is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-plain isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-plain isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cyrus-sasl-sql is earlier than 0:2.1.23-15.el6_6.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1646060797025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646060797004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-sql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1646060797026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cyrus-sasl-sql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1646060797027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1646060797025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1642429400001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642429400001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="log4j isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1642429400002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="log4j isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1642429400003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1642429400004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642429400001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="log4j-javadoc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1642429400005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="log4j-javadoc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1642429400006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1642429400007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642429400001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="log4j-manual isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1642429400008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="log4j-manual isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1642429400009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1643918500001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643918500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1643918500002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643918500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1643918500003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643918500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1644500972001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644500972001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1644500972002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644500972001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1644500972003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644500972001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j is earlier than 0:1.2.14-6.4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1655843011001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655843011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-javadoc is earlier than 0:1.2.14-6.4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1655843011002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655843011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="log4j-manual is earlier than 0:1.2.14-6.4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1655843011003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1642429400007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655843011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-all-modules is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-all-modules isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-all-modules isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-filesystem is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-filesystem isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-filesystem isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-geoip is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-geoip isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-geoip isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-image-filter isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-image-filter isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-perl is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-perl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-perl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-xslt-filter isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-http-xslt-filter isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-mail is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-mail isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-mail isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-stream is earlier than 0:1.10.3-3.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261762025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-stream isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632261762026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nginx-mod-stream isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632261762027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1636378490009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1636378490001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1649695619009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649695619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1656962023001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656962023001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1656962023002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1656962023003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1656962023004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656962023001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-askpass isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1656962023005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-askpass isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1656962023006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1656962023007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656962023001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-clients isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1656962023008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-clients isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1656962023009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1656962023010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656962023001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-ldap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1656962023011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-ldap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1656962023012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1656962023013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656962023001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-server isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1656962023014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssh-server isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1656962023015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1656962023016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1656962023016"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="pam_ssh_agent_auth isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1656962023017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="pam_ssh_agent_auth isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1656962023018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1657561632001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561632001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1657561632002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561632001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1657561632003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561632001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1657561632004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561632001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1657561632005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561632001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1657561632006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561632006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1658171011001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1658171011002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1658171011003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1658171011004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1658171011005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171011001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1658171011006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171011006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntp is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442934001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633442934002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633442934003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntp-doc is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442934004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442934004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntp-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633442934005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntp-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633442934006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntp-perl is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442934007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntp-perl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633442934008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntp-perl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633442934009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntpdate is earlier than 0:4.2.6p5-16.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442934010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntpdate isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1633442934011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ntpdate isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1633442934012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724134001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724134001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724134002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724134003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724134004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724134001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724134005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724134006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724134007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724134001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl-perl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724134008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl-perl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724134009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-59.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1608724134010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1608724134001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl-static isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1608724134011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openssl-static isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1608724134012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1614885634001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1614885634001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1614885634002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1614885634001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1614885634003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1614885634003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-60.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1614885634004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1614885634003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-61.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261785001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261785001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-61.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261785002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261785001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-61.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261785003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261785003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-61.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632261785004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632261785003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-62.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262317001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-62.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262317002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-62.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262317003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-62.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262317004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647550273001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647550273001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647550273002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647550273001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647550273003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647550273003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647550273004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647550273003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1657817606001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817606001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1657817606002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817606001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1657817606003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817606003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1657817606004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817606003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl is earlier than 4:5.10.1-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Archive-Extract isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Archive-Extract isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Archive-Tar isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Archive-Tar isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CGI is earlier than 0:3.51-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-CGI isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-CGI isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPAN is earlier than 0:1.9402-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-CPAN isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-CPAN isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005016"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-CPANPLUS isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-CPANPLUS isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Compress-Raw-Bzip2 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Compress-Raw-Bzip2 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Compress-Raw-Zlib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Compress-Raw-Zlib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Compress-Zlib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Compress-Zlib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005028"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Digest-SHA isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Digest-SHA isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005031"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-CBuilder isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-CBuilder isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005034"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-Embed isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-Embed isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005037"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-MakeMaker isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-MakeMaker isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005040"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-ParseXS isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-ExtUtils-ParseXS isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-File-Fetch is earlier than 0:0.26-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005043"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-File-Fetch isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-File-Fetch isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Compress-Base isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005047" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Compress-Base isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005048" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005049" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Compress-Bzip2 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005050" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Compress-Bzip2 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005051" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005052" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Compress-Zlib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005053" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Compress-Zlib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005054" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005055" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005055"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Zlib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005056" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IO-Zlib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005057" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005058" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005058"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IPC-Cmd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005059" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-IPC-Cmd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005060" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005061" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005061"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Locale-Maketext-Simple isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005062" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Locale-Maketext-Simple isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005063" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message is earlier than 1:0.02-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005064" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005064"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Log-Message isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005065" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Log-Message isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005066" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005067" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005067"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Log-Message-Simple isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005068" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Log-Message-Simple isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005069" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Build is earlier than 1:0.3500-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005070" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005070"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Build isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005071" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Build isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005072" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005073" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005073"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-CoreList isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005074" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-CoreList isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005075" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load is earlier than 1:0.16-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005076" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005076"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Load isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005077" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Load isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005078" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005079" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005079"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Load-Conditional isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005080" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Load-Conditional isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005081" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005082" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005064"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Loaded isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005083" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Loaded isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005084" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005085" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005085"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Pluggable isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005086" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Module-Pluggable isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005087" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005088" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005088"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Object-Accessor isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005089" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Object-Accessor isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005090" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Package-Constants is earlier than 1:0.02-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005091" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005064"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Package-Constants isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005092" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Package-Constants isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005093" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Params-Check is earlier than 1:0.26-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005094" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005094"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Params-Check isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005095" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Params-Check isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005096" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005097" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005097"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Parse-CPAN-Meta isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005098" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Parse-CPAN-Meta isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005099" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005100" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005100"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Pod-Escapes isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005101" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Pod-Escapes isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005102" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005103" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005103"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Pod-Simple isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005104" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Pod-Simple isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005105" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Term-UI is earlier than 0:0.20-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005106" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005106"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Term-UI isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005107" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Term-UI isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005108" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Harness is earlier than 0:3.17-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005109" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005109"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Test-Harness isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005110" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Test-Harness isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005111" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Simple is earlier than 0:0.92-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005112" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005112"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Test-Simple isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005113" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Test-Simple isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005114" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005115" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005115"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Time-HiRes isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005116" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Time-HiRes isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005117" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-Piece is earlier than 0:1.15-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005118" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005118"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Time-Piece isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005119" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Time-Piece isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005120" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-core is earlier than 0:5.10.1-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005121" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005121"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-core isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005122" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-core isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005123" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-devel is earlier than 4:5.10.1-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005124" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005124"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005125" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005126" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-libs is earlier than 4:5.10.1-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005127" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005124"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-libs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005128" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-libs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005129" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-parent is earlier than 1:0.221-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005130" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005130"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-parent isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005131" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-parent isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005132" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-suidperl is earlier than 4:5.10.1-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005133" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-suidperl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005134" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-suidperl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005135" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-version is earlier than 3:0.77-146.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1657561005136" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657561005136"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-version isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1657561005137" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-version isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1657561005138" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl is earlier than 4:5.10.1-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Extract is earlier than 1:0.38-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Tar is earlier than 0:1.58-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CGI is earlier than 0:3.51-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPAN is earlier than 0:1.9402-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPANPLUS is earlier than 0:0.88-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234008"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Zlib is earlier than 0:2.021-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Digest-SHA is earlier than 1:5.47-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234011"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-Embed is earlier than 0:1.28-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234012"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234014"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-File-Fetch is earlier than 0:0.26-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234015"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Base is earlier than 0:2.021-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Zlib is earlier than 0:2.021-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Zlib is earlier than 1:1.09-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IPC-Cmd is earlier than 1:0.56-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234020"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234021"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message is earlier than 1:0.02-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message-Simple is earlier than 0:0.04-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234023"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Build is earlier than 1:0.3500-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234024"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-CoreList is earlier than 0:2.18-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load is earlier than 1:0.16-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234026"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load-Conditional is earlier than 0:0.30-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234027"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Loaded is earlier than 1:0.02-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Pluggable is earlier than 1:3.90-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234029"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Object-Accessor is earlier than 1:0.34-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234030"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Package-Constants is earlier than 1:0.02-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Params-Check is earlier than 1:0.26-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234032"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234033"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Escapes is earlier than 1:1.04-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234034"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Simple is earlier than 1:3.13-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234035"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Term-UI is earlier than 0:0.20-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234036"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Harness is earlier than 0:3.17-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234037"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Simple is earlier than 0:0.92-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234038"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-HiRes is earlier than 4:1.9721-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234039"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-Piece is earlier than 0:1.15-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234040"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-core is earlier than 0:5.10.1-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234041"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-devel is earlier than 4:5.10.1-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-libs is earlier than 4:5.10.1-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-parent is earlier than 1:0.221-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234044"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-suidperl is earlier than 4:5.10.1-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-version is earlier than 3:0.77-145.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328234046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328234046"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl is earlier than 4:5.10.1-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CGI is earlier than 0:3.51-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPAN is earlier than 0:1.9402-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264008"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264011"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264012"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264014"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-File-Fetch is earlier than 0:0.26-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264015"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264020"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264021"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message is earlier than 1:0.02-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264023"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Build is earlier than 1:0.3500-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264024"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load is earlier than 1:0.16-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264026"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264027"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264029"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264030"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Package-Constants is earlier than 1:0.02-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Params-Check is earlier than 1:0.26-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264032"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264033"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264034"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264035"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Term-UI is earlier than 0:0.20-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264036"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Harness is earlier than 0:3.17-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264037"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Simple is earlier than 0:0.92-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264038"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264039"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-Piece is earlier than 0:1.15-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264040"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-core is earlier than 0:5.10.1-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264041"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-devel is earlier than 4:5.10.1-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-libs is earlier than 4:5.10.1-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-parent is earlier than 1:0.221-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264044"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-suidperl is earlier than 4:5.10.1-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-version is earlier than 3:0.77-146.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632328264046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632328264046"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-68.el6" id="oval:com.tuxcare.clsa:tst:1616001357001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1616001357001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1616001357002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1616001357003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-68.el6" id="oval:com.tuxcare.clsa:tst:1616001357004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1616001357001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1616001357005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1616001357006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-68.el6" id="oval:com.tuxcare.clsa:tst:1616001357007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1616001357001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-libs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1616001357008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-libs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1616001357009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-68.el6" id="oval:com.tuxcare.clsa:tst:1616001357010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1616001357010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-test isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1616001357011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-test isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1616001357012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-68.el6" id="oval:com.tuxcare.clsa:tst:1616001357013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1616001357010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-tools isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1616001357014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-tools isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1616001357015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-68.el6" id="oval:com.tuxcare.clsa:tst:1616001357016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1616001357010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tkinter isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1616001357017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tkinter isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1616001357018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442879001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442879001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442879002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442879001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442879003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442879001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442879004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442879004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442879005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442879004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442879006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442879004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1646665957001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646665957001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1646665957002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646665957001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1646665957003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646665957001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1646665957004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646665957004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1646665957005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646665957004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1646665957006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646665957004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647958513001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647958513001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647958513002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647958513001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647958513003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647958513001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647958513004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647958513004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647958513005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647958513004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1647958513006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647958513004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1658347112001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658347112001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1658347112002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658347112001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1658347112003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658347112001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1658347112004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658347112004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1658347112005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658347112004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1658347112006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658347112004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-bcmath isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-bcmath isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-cli isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-cli isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-dba isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-dba isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-embedded isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-embedded isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-enchant isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-enchant isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-fpm isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-fpm isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-gd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-gd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-imap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-imap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-intl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-intl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-ldap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-ldap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-mbstring isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-mbstring isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-mysql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-mysql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-odbc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193047" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-odbc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193048" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193049" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-pdo isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193050" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-pdo isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193051" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193052" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-pgsql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193053" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-pgsql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193054" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193055" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-process isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193056" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-process isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193057" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193058" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-pspell isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193059" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-pspell isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193060" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193061" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-recode isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193062" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-recode isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193063" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193064" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-snmp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193065" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-snmp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193066" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193067" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-soap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193068" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-soap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193069" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193070" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-tidy isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193071" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-tidy isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193072" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193073" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-xml isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193074" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-xml isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193075" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193076" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-xmlrpc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193077" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-xmlrpc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193078" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673193079" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673193001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-zts isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1637673193080" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="php-zts isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1637673193081" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1658171149027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171149001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="quagga is earlier than 0:0.99.15-14.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643112395001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643112395001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="quagga isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643112395002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="quagga isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643112395003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="quagga-contrib is earlier than 0:0.99.15-14.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643112395004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643112395001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="quagga-contrib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643112395005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="quagga-contrib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643112395006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="quagga-devel is earlier than 0:0.99.15-14.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643112395007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643112395007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="quagga-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643112395008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="quagga-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643112395009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss is earlier than 0:3.44.0-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1640002354001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640002354001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1640002354002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1640002354003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-devel is earlier than 0:3.44.0-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1640002354004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640002354001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1640002354005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1640002354006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-pkcs11-devel is earlier than 0:3.44.0-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1640002354007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640002354001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-pkcs11-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1640002354008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-pkcs11-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1640002354009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-sysinit is earlier than 0:3.44.0-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1640002354010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640002354010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-sysinit isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1640002354011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-sysinit isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1640002354012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-tools is earlier than 0:3.44.0-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1640002354013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640002354010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-tools isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1640002354014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="nss-tools isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1640002354015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1641903536001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1641903536001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1641903536002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1641903536003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1641903536004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1641903536001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1641903536005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1641903536006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1641903536007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1641903536007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2-python isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1641903536008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2-python isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1641903536009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1641903536010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1641903536007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2-static isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1641903536011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libxml2-static isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1641903536012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1647255880001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647255880001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1647255880002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647255880001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1647255880003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647255880003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1647255880004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1647255880003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1653004535001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653004535001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsync isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1653004535002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsync isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1653004535003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog-gnutls is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-gnutls isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-gnutls isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog-gssapi is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-gssapi isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-gssapi isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog-mysql is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-mysql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-mysql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog-pgsql is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-pgsql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-pgsql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog-relp is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-relp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-relp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsyslog-snmp is earlier than 0:5.8.10-12.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654717777019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654717777001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-snmp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1654717777020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="rsyslog-snmp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1654717777021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1654717777019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1649170979001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649170979001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-X11 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649170979002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-X11 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649170979003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1649170979004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649170979001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649170979005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649170979006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1649170979007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649170979001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-enhanced isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649170979008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-enhanced isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649170979009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1649170979010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649170979001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-filesystem isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649170979011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-filesystem isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649170979012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1649170979013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649170979001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-minimal isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649170979014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="vim-minimal isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649170979015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1649869347001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649869347001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1649869347002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649869347001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1649869347003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649869347001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1649869347004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649869347001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1649869347005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649869347001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1653006752001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653006752001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1653006752002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653006752001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1653006752003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653006752001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1653006752004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653006752001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1653006752005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653006752001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1653933185001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653933185001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1653933185002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653933185001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1653933185003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653933185001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1653933185004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653933185001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1653933185005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1653933185001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1654529495001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654529495001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1654529495002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654529495001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1654529495003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654529495001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1654529495004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654529495001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1654529495005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654529495001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1654804579001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654804579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1654804579002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654804579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1654804579003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654804579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1654804579004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654804579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1654804579005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654804579001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1655320860001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655320860001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1655320860002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655320860001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1655320860003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655320860001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1655320860004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655320860001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1655320860005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655320860001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1655901698001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655901698001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1655901698002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655901698001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1655901698003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655901698001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1655901698004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655901698001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1655901698005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1655901698001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1657182572001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657182572001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1657182572002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657182572001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1657182572003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657182572001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1657182572004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657182572001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1657182572005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657182572001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1657817751001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817751001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1657817751002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817751001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1657817751003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817751001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1657817751004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817751001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1657817751005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1657817751001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1658171278001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171278001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1658171278002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171278001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1658171278003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171278001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1658171278004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171278001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1658171278005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658171278001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1638803795001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803795001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1638803795002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803795001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1638803795003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803795001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1638803795004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803795001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1638803795005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803795001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1640621325001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621325001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1640621325002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621325001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1640621325003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621325001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1640621325004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621325001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1640621325005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621325001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1642087497001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642087497001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1642087497002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642087497001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1642087497003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642087497001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1642087497004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642087497001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1642087497005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1642087497001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643640508001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643640508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643640508002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643640508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643640508003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643640508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643640508004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643640508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1643640508005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643640508001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1644855718001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644855718001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1644855718002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644855718001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1644855718003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644855718001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1644855718004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644855718001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1644855718005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1644855718001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1645466182001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1645466182001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1645466182002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1645466182001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1645466182003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1645466182001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1645466182004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1645466182001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1645466182005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1645466182001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1646915237001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646915237001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1646915237002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646915237001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1646915237003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646915237001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1646915237004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646915237001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1646915237005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1646915237001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 2:7.4.629-6.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745118001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745118001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 2:7.4.629-6.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745118002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745118001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 2:7.4.629-6.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745118003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745118001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 2:7.4.629-6.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745118004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745118001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 2:7.4.629-6.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1634745118005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1634745118001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 2:7.4.629-7.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673150001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 2:7.4.629-7.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673150002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 2:7.4.629-7.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673150003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 2:7.4.629-7.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673150004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 2:7.4.629-7.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1637673150005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1637673150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1652706231001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652706231001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="minizip isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1652706231002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="minizip isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1652706231003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1652706231004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652706231001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="minizip-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1652706231005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="minizip-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1652706231006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1652706231007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652706231001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="zlib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1652706231008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="zlib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1652706231009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1652706231010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652706231001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="zlib-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1652706231011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="zlib-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1652706231012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1652706231013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652706231013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="zlib-static isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1652706231014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="zlib-static isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1652706231015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-demo isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-demo isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-demo-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-demo-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-devel-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-devel-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-headless isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-headless isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-headless-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-headless-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-javadoc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-javadoc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-javadoc-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-javadoc-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-src isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-src isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.275.b01-1.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262184034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262184001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-src-debug isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262184035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.8.0-openjdk-src-debug isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262184036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.332.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1654174749012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1654174749001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262221001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262221001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="squid34 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262221002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="squid34 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262221003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="microcode_ctl is earlier than 2:1.17-33.34.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1632262337001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1632262337001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="microcode_ctl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1632262337002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="microcode_ctl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1632262337003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="microcode_ctl is earlier than 2:1.17-33.37.el6_10.tuxcare.els" id="oval:com.tuxcare.clsa:tst:1650376845001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650376845001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="xterm is earlier than 0:253-2.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1650575983001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575983001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650575983001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="xterm isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650575983002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575983001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="xterm isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650575983003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575983001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1638803819001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803819001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="binutils isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803819002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="binutils isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803819003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1638803819004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803819004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="binutils-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803819005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="binutils-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803819006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1640621287001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621287001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1640621287002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1640621287002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1641904053001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1641904053001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1641904053002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1641904053002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 0:2.20.51.0.2-5.49.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442827001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 0:2.20.51.0.2-5.49.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1633442827002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1633442827002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openvpn is earlier than 0:2.4.9-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1649171018001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649171018001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openvpn isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649171018002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openvpn isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649171018003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openvpn-devel is earlier than 0:2.4.9-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1649171018004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1649171018004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openvpn-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1649171018005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openvpn-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1649171018006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap is earlier than 0:2.4.40-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1638803748001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803748001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803748002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803748003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-clients is earlier than 0:2.4.40-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1638803748004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803748004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-clients isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803748005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-clients isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803748006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-devel is earlier than 0:2.4.40-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1638803748007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803748001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803748008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803748009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers is earlier than 0:2.4.40-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1638803748010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803748004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-servers isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803748011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-servers isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803748012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers-sql is earlier than 0:2.4.40-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1638803748013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1638803748004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-servers-sql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1638803748014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="openldap-servers-sql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1638803748015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap is earlier than 0:2.4.40-16.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1652986174001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652986174001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-clients is earlier than 0:2.4.40-16.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1652986174002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652986174002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-devel is earlier than 0:2.4.40-16.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1652986174003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652986174001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers is earlier than 0:2.4.40-16.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1652986174004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652986174002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers-sql is earlier than 0:2.4.40-16.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1652986174005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1652986174002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-25.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1650575956001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1650575956001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="squid isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1650575956002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="squid isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1650575956003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-29.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1628782974001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1628782974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.cloudlinux.els" id="oval:com.tuxcare.clsa:tst:1629902677001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1629902677001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick is earlier than 0:6.7.2.7-7.el6" id="oval:com.tuxcare.clsa:tst:1617641265001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617641265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1617641265002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1617641265003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-c++ is earlier than 0:6.7.2.7-7.el6" id="oval:com.tuxcare.clsa:tst:1617641265004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617641265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-c++ isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1617641265005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-c++ isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1617641265006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-c++-devel is earlier than 0:6.7.2.7-7.el6" id="oval:com.tuxcare.clsa:tst:1617641265007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617641265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-c++-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1617641265008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-c++-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1617641265009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-devel is earlier than 0:6.7.2.7-7.el6" id="oval:com.tuxcare.clsa:tst:1617641265010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617641265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1617641265011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1617641265012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-doc is earlier than 0:6.7.2.7-7.el6" id="oval:com.tuxcare.clsa:tst:1617641265013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617641265013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1617641265014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1617641265015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-perl is earlier than 0:6.7.2.7-7.el6" id="oval:com.tuxcare.clsa:tst:1617641265016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1617641265013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-perl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1617641265017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ImageMagick-perl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1617641265018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="polkit is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643211942001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643211942001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643211942002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643211942003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="polkit-desktop-policy is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643211942004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643211942004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit-desktop-policy isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643211942005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit-desktop-policy isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643211942006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="polkit-devel is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643211942007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643211942001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643211942008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643211942009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="polkit-docs is earlier than 0:0.96-11.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1643211942010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1643211942010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit-docs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1643211942011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="polkit-docs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1643211942012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643211942010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="screen is earlier than 0:4.0.3-20.el6.cloudlinux.els6" id="oval:com.tuxcare.clsa:tst:1618497131001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1618497131001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1618497131001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="screen isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1618497131002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1618497131001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="screen isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1618497131003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1618497131001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1658853743001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658853743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1658853743002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658853743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1658853743003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658853743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1658853743004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658853743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1658853743005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1658853743001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1659018147001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1659018147008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659018147002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.342.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1659638796012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1659638964027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659638964001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1659639100001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659639100001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1659639100002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659639100001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1659639100003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659639100001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1659639100004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659639100001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1659639100005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1659639100001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660761670001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660761670001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660761670002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660761670003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660761670004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660761670001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-greylist isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660761670005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-greylist isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660761670006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660761670007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660761670001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-mon isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660761670008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-mon isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660761670009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660761670010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660761670001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-mysql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660761670011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-mysql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660761670012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660761670013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660761670001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-pgsql isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660761670014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="exim-pgsql isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660761670015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660761947001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660761947001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660762053001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762053001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660762053002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762053001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660762053003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762053001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660762053004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762053001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1660762053005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762053005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1660762248001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762248001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="expat isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660762248002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="expat isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660762248003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1660762248004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762248001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="expat-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1660762248005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="expat-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1660762248006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1660762683001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762683001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1660762683002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762683001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1660762683003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762683001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1660762683004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762683001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1660762683005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1660762683001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.7.0-openjdk is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1661176564001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661176564001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1661176564002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1661176564003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.7.0-openjdk-demo is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1661176564004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661176564001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-demo isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1661176564005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-demo isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1661176564006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.7.0-openjdk-devel is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1661176564007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661176564001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1661176564008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1661176564009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.7.0-openjdk-javadoc is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1661176564010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661176564010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-javadoc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1661176564011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-javadoc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1661176564012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.7.0-openjdk-src is earlier than 1:1.7.0.351-2.6.28.0.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1661176564013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661176564001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-src isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1661176564014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="java-1.7.0-openjdk-src isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1661176564015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1661176564013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1661442764001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661442764001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1661442764002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661442764001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1661442764003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661442764001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1661442764004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661442764001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1661442764005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661442764001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1661442999001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1661442999001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1662658348001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1662658348001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1663173256001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663173256001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1663173256002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663173256002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1663173256003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663173256003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1663173256004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663173256001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1663173256005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663173256005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1663591920001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663591920001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1663591920002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663591920002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1663591920003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663591920003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1663591920004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663591920001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1663591920005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1663591920005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1664193203001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664193203001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1664193203002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664193203001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1664476383001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476383001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1664476383002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476383001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1664476383003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476383001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1664476383004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476383001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1664476383005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476383001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1664476612001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476612001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1664476612002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476612001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1664476612003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476612003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1664476612004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476612003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1664476612005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476612001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1664476612006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1664476612001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="lemon is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1665428177001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665428177001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="lemon isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1665428177002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="lemon isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1665428177003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1665428177004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665428177004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1665428177005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1665428177006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-devel is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1665428177007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665428177004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1665428177008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1665428177009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-doc is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1665428177010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665428177001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1665428177011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1665428177012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-tcl is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1665428177013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665428177001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite-tcl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1665428177014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sqlite-tcl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1665428177015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1665501369001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665501369001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1665501511001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665501511001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1665680212001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665680212001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1665680212002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665680212001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1665680212003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665680212001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1665680212004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665680212001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1665680212005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1665680212001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1667493762001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1667493762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1667493762002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1667493762001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl is earlier than 4:5.10.1-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CGI is earlier than 0:3.51-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPAN is earlier than 0:1.9402-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434008"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434011"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434012"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434014"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-File-Fetch is earlier than 0:0.26-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434015"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434020"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434021"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message is earlier than 1:0.02-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434023"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Build is earlier than 1:0.3500-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434024"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load is earlier than 1:0.16-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434026"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434027"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434029"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434030"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Package-Constants is earlier than 1:0.02-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Params-Check is earlier than 1:0.26-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434032"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434033"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434034"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434035"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Term-UI is earlier than 0:0.20-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434036"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Harness is earlier than 0:3.17-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434037"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Simple is earlier than 0:0.92-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434038"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434039"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-Piece is earlier than 0:1.15-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434040"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-core is earlier than 0:5.10.1-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434041"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-devel is earlier than 4:5.10.1-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-libs is earlier than 4:5.10.1-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-parent is earlier than 1:0.221-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434044"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-suidperl is earlier than 4:5.10.1-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-version is earlier than 3:0.77-146.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1668120434046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668120434046"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="lemon is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1668121215001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668121215001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1668121215002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668121215002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-devel is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1668121215003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668121215002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-doc is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1668121215004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668121215001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-tcl is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1668121215005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1668121215001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1669066613009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669066613001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="xterm is earlier than 0:253-2.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1669236294001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575983001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236294001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1669236630001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236630001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1669236630002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236630001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1669236630003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236630001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1669236630004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236630004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1669236630005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236630004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1669236630006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236630004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" id="oval:com.tuxcare.clsa:tst:1669236934001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" id="oval:com.tuxcare.clsa:tst:1669236934002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" id="oval:com.tuxcare.clsa:tst:1669236934003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" id="oval:com.tuxcare.clsa:tst:1669236934004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els32" id="oval:com.tuxcare.clsa:tst:1669236934005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1669236934001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1670521677001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670521677001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1670521677002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670521677001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1670521677003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670521677003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1670521677004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670521677003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="krb5-devel is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="krb5-libs is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-libs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-libs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="krb5-pkinit-openssl is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-pkinit-openssl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-pkinit-openssl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="krb5-server is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-server isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-server isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="krb5-server-ldap is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-server-ldap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-server-ldap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="krb5-workstation is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-workstation isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="krb5-workstation isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libkadm5 is earlier than 0:1.10.3-65.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1670874451019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874451001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libkadm5 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1670874451020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libkadm5 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1670874451021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1670874451019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" id="oval:com.tuxcare.clsa:tst:1670874574001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" id="oval:com.tuxcare.clsa:tst:1670874574002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" id="oval:com.tuxcare.clsa:tst:1670874574003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" id="oval:com.tuxcare.clsa:tst:1670874574004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els33" id="oval:com.tuxcare.clsa:tst:1670874574005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1670874574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" id="oval:com.tuxcare.clsa:tst:1671033543001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671033543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" id="oval:com.tuxcare.clsa:tst:1671033543002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671033543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" id="oval:com.tuxcare.clsa:tst:1671033543003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671033543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" id="oval:com.tuxcare.clsa:tst:1671033543004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671033543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els34" id="oval:com.tuxcare.clsa:tst:1671033543005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671033543001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1671126165001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126165001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1671126165002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126165002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1671126165003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126165002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" id="oval:com.tuxcare.clsa:tst:1671126265001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" id="oval:com.tuxcare.clsa:tst:1671126265002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" id="oval:com.tuxcare.clsa:tst:1671126265003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" id="oval:com.tuxcare.clsa:tst:1671126265004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els35" id="oval:com.tuxcare.clsa:tst:1671126265005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671126265001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1671481339001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671481339001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1671481339002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671481339001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1671481339003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671481339001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1671481339004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671481339001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1671481339005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671481339001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1671481339006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1671481339006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" id="oval:com.tuxcare.clsa:tst:1674813830001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1674813830001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" id="oval:com.tuxcare.clsa:tst:1674813830002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1674813830001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" id="oval:com.tuxcare.clsa:tst:1674813830003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1674813830001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" id="oval:com.tuxcare.clsa:tst:1674813830004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1674813830001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els36" id="oval:com.tuxcare.clsa:tst:1674813830005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1674813830001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1675111939001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675111939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1675111939002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675111939002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1675111939003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675111939003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1675111939004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675111939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1675111939005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675111939005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" id="oval:com.tuxcare.clsa:tst:1675373662001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675373662001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" id="oval:com.tuxcare.clsa:tst:1675373662002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675373662001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" id="oval:com.tuxcare.clsa:tst:1675373662003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675373662001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" id="oval:com.tuxcare.clsa:tst:1675373662004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675373662001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els37" id="oval:com.tuxcare.clsa:tst:1675373662005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675373662001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo is earlier than 0:1.8.6p3-32.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985571001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985571001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo-devel is earlier than 0:1.8.6p3-32.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985571002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985571002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.362.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1675985852012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1675985852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1676025596001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1676025596001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1676025596002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1676025596001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1676025596003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1676025596003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1676025596004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1676025596003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="emacs-git isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="emacs-git isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="emacs-git-el isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="emacs-git-el isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-all isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-all isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-cvs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-cvs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-daemon isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-daemon isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-email isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-email isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-gui isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-gui isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-svn isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="git-svn isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gitk isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gitk isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gitweb isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="gitweb isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677231280034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677231280001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Git isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677231280035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="perl-Git isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677231280036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tar is earlier than 2:1.23-15.el6_8.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1677791921001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677791921001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1677791921001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tar isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1677791921002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677791921001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tar isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1677791921003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677791921001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136793001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136793001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136793002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136793002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136793003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136793003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136793004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136793001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136793005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136793005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136944001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136944001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136944002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136944001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136944003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136944001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136944004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136944004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136944005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136944004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1678136944006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678136944004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1678395661027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678395661001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" id="oval:com.tuxcare.clsa:tst:1678820960001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678820960001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" id="oval:com.tuxcare.clsa:tst:1678820960002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678820960001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" id="oval:com.tuxcare.clsa:tst:1678820960003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678820960001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" id="oval:com.tuxcare.clsa:tst:1678820960004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678820960001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els38" id="oval:com.tuxcare.clsa:tst:1678820960005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1678820960001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" id="oval:com.tuxcare.clsa:tst:1679924984001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1679924984001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" id="oval:com.tuxcare.clsa:tst:1679924984002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1679924984001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" id="oval:com.tuxcare.clsa:tst:1679924984003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1679924984001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" id="oval:com.tuxcare.clsa:tst:1679924984004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1679924984001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els39" id="oval:com.tuxcare.clsa:tst:1679924984005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1679924984001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss is earlier than 0:3.44.0-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1681327540001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681327540001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-devel is earlier than 0:3.44.0-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1681327540002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681327540001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-pkcs11-devel is earlier than 0:3.44.0-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1681327540003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681327540001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-sysinit is earlier than 0:3.44.0-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1681327540004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681327540004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-tools is earlier than 0:3.44.0-12.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1681327540005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681327540004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1681490707001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681490707001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1681490707002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681490707002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1681490707003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1681490707002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1682347721001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682347721001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1682347721002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682347721002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1682347721003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682347721002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1682705952001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1682705952008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1682705952002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1683236532001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683236532001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1683236532002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683236532001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1683236532003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683236532003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1683236532004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683236532003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1683814164012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1683814164001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sysstat is earlier than 0:9.0.4-33.el6_9.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1685377120001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1685377120001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685377120001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sysstat isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1685377120002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1685377120001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sysstat isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1685377120003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1685377120001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" id="oval:com.tuxcare.clsa:tst:1685377319001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685377319001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" id="oval:com.tuxcare.clsa:tst:1685377319002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685377319001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" id="oval:com.tuxcare.clsa:tst:1685377319003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685377319001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" id="oval:com.tuxcare.clsa:tst:1685377319004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685377319001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els40" id="oval:com.tuxcare.clsa:tst:1685377319005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685377319001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" id="oval:com.tuxcare.clsa:tst:1685634253001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685634253001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" id="oval:com.tuxcare.clsa:tst:1685634253002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685634253001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" id="oval:com.tuxcare.clsa:tst:1685634253003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685634253001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" id="oval:com.tuxcare.clsa:tst:1685634253004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685634253001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els41" id="oval:com.tuxcare.clsa:tst:1685634253005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1685634253001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1687268961001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687268961001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1687268961002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687268961001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1687268961003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687268961003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1687268961004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687268961003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1687794906001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687794906001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1687794906002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687794906001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1687794906003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687794906001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1687794906004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687794906001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1687794906005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1687794906001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.372.b07-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1688679628012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1688679628001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap is earlier than 0:2.4.40-16.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1689702499001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689702499001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-clients is earlier than 0:2.4.40-16.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1689702499002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689702499002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-devel is earlier than 0:2.4.40-16.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1689702499003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689702499001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers is earlier than 0:2.4.40-16.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1689702499004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689702499002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers-sql is earlier than 0:2.4.40-16.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1689702499005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689702499002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1689886440001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689886440001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1689886440002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689886440001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1689886440003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689886440001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1689886440004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689886440004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1689886440005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689886440004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1689886440006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1689886440004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.382.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1691081846012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691081846001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1691576939001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691576939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1691576939002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691576939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1691576939003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691576939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1691576939004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691576939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1691576939005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691576939001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1691576939006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1691576939006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="microcode_ctl is earlier than 3:1.17-33.39.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1692108914001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692108914001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="amanda is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293040001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293040001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293040002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293040003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="amanda-client is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293040004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293040004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda-client isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293040005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda-client isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293040006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="amanda-devel is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293040007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293040001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293040008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293040009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="amanda-server is earlier than 0:2.6.1p2-9.el6_6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293040010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293040004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda-server isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293040011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="amanda-server isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293040012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293040010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsmbclient is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsmbclient isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsmbclient isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsmbclient-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsmbclient-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsmbclient-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-client is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-client isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-client isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-common is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-doc is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-domainjoin-gui is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-domainjoin-gui isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-domainjoin-gui isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-glusterfs is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-glusterfs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-glusterfs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-swat is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-swat isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-swat isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-clients is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind-clients isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind-clients isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-krb5-locator is earlier than 0:3.6.23-53.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1692293238037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692293238007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind-krb5-locator isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1692293238038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="samba-winbind-krb5-locator isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1692293238039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1692632368027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1692632368001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="microcode_ctl is earlier than 3:1.17-33.40.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1693410662001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1693410662001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="busybox is earlier than 1:1.15.1-21.el6_6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1693906015001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1693906015001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="busybox-petitboot is earlier than 1:1.15.1-21.el6_6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1693906015002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650376937004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1693906015001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1694536738001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1694536738001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1694536738002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1694536738002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" id="oval:com.tuxcare.clsa:tst:1695063163001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695063163001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" id="oval:com.tuxcare.clsa:tst:1695063163002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695063163001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" id="oval:com.tuxcare.clsa:tst:1695063163003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695063163001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" id="oval:com.tuxcare.clsa:tst:1695063163004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695063163001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els42" id="oval:com.tuxcare.clsa:tst:1695063163005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695063163001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" id="oval:com.tuxcare.clsa:tst:1695319372001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695319372001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" id="oval:com.tuxcare.clsa:tst:1695319372002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695319372001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" id="oval:com.tuxcare.clsa:tst:1695319372003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695319372001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" id="oval:com.tuxcare.clsa:tst:1695319372004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695319372001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els44" id="oval:com.tuxcare.clsa:tst:1695319372005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695319372001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libssh2 is earlier than 0:1.4.2-3.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1695835423001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695835423001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libssh2 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1695835423002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libssh2 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1695835423003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libssh2-devel is earlier than 0:1.4.2-3.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1695835423004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695835423001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libssh2-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1695835423005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libssh2-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1695835423006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libssh2-docs is earlier than 0:1.4.2-3.el6_10.1.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1695835423007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1695835423007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libssh2-docs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1695835423008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libssh2-docs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1695835423009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1695835423007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1696878189001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696878189001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1696878189002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696878189001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1696878189003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696878189001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1696878189004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696878189004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1696878189005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696878189004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1696878189006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696878189004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1696971066001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696971066001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1696971066002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1696971066002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp is earlier than 0:0.4.3-3.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1697136085001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136085001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1697136085002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1697136085003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-devel is earlier than 0:0.4.3-3.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1697136085004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136085001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1697136085005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1697136085006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-java is earlier than 0:0.4.3-3.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1697136085007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136085007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp-java isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1697136085008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp-java isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1697136085009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-tools is earlier than 0:0.4.3-3.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1697136085010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136085007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp-tools isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1697136085011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libwebp-tools isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1697136085012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1697136232001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136232001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1697136232002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136232001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1697136232003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136232003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1697136232004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136232003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1697136232005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136232001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1697136232006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697136232001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1697464688001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697464688001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1697464688002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697464688002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1697464688003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697464688002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1697482739001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697482739001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1697482739002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697482739001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1697482739003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697482739001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1697482739004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697482739001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1697482739005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697482739001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="quagga is earlier than 0:0.99.15-14.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1697817200001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697817200001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="quagga-contrib is earlier than 0:0.99.15-14.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1697817200002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697817200001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="quagga-devel is earlier than 0:0.99.15-14.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1697817200003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1643112395007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1697817200003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-all-modules is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-filesystem is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-geoip is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-image-filter is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-perl is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-http-xslt-filter is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-mail is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nginx-mod-stream is earlier than 0:1.10.3-4.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1698101447009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261762025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101447001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1698101603001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101603001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1698101603002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101603001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1698101603003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101603001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1698101603004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101603004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1698101603005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101603004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1698101603006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698101603004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1698180806001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698180806001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1698180806002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698180806001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1698180806003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698180806001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1698180806004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698180806001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1698180806005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698180806005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" id="oval:com.tuxcare.clsa:tst:1698352063001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698352063001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" id="oval:com.tuxcare.clsa:tst:1698352063002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698352063001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" id="oval:com.tuxcare.clsa:tst:1698352063003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698352063001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" id="oval:com.tuxcare.clsa:tst:1698352063004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698352063001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els45" id="oval:com.tuxcare.clsa:tst:1698352063005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1698352063001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1699381307001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699381307001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1699381307002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699381307001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1699381307003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699381307003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1699381307004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699381307003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1699908139001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699908139001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1699908139002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699908139001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1699908139003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699908139001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1699908139004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699908139001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1699908139005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1699908139001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1700164396001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700164396001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1700591071001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1700591071008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700591071002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsmbclient is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsmbclient-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-client is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-common is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-doc is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-domainjoin-gui is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-glusterfs is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-swat is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-clients is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-krb5-locator is earlier than 0:3.6.23-53.el6_10.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1700852317013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1700852317003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim is earlier than 0:4.92.3-3.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1701285908001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701285908001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-greylist is earlier than 0:4.92.3-3.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1701285908002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701285908001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mon is earlier than 0:4.92.3-3.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1701285908003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701285908001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-mysql is earlier than 0:4.92.3-3.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1701285908004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701285908001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="exim-pgsql is earlier than 0:4.92.3-3.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1701285908005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660761670013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701285908001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1701286147001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701286147001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1701286463001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701286463001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libksba is earlier than 0:1.0.7-4.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1701445092001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1701445092001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701445092001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libksba isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1701445092002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1701445092001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libksba isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1701445092003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1701445092001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libksba-devel is earlier than 0:1.0.7-4.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1701445092004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1701445092004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1701445092001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libksba-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1701445092005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1701445092004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libksba-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1701445092006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1701445092004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="microcode_ctl is earlier than 3:1.17-33.41.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1702421029001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1702421029001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1702496332001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1702496332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1702496473001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1702496473001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="haproxy is earlier than 0:1.5.18-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1703183093001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1703183093001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703183093001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="haproxy isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1703183093002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1703183093001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="haproxy isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1703183093003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1703183093001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703183242001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703183242001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1703183411001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703183411001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh is earlier than 0:5.3p1-125.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703785140001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703785140001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-askpass is earlier than 0:5.3p1-125.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703785140002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703785140001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-clients is earlier than 0:5.3p1-125.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703785140003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703785140001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-ldap is earlier than 0:5.3p1-125.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703785140004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703785140001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssh-server is earlier than 0:5.3p1-125.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703785140005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703785140001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="pam_ssh_agent_auth is earlier than 0:0.9.3-125.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1703785140006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1656962023016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1703785140006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1705079922001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705079922001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1705079922002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705079922001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1705079922003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705079922001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1705079922004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705079922004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1705079922005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705079922004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1705079922006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705079922004"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1705494430001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1705494430008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1705494430002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1706027577001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706027577001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1706027727001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706027727001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.402.b06-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1706698228012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1706698228001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo is earlier than 0:1.8.6p3-32.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1708427919001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1708427919001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sudo-devel is earlier than 0:1.8.6p3-32.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1708427919002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1611743864005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1708427919002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1708639232001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1708639232001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1708639232002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1708639232001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1708639232003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1708639232003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1708639232004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1708639232003"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1709204660001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1709204660008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709204660002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" id="oval:com.tuxcare.clsa:tst:1709563938001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709563938001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" id="oval:com.tuxcare.clsa:tst:1709563938002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709563938001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" id="oval:com.tuxcare.clsa:tst:1709563938003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709563938001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" id="oval:com.tuxcare.clsa:tst:1709563938004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709563938001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els46" id="oval:com.tuxcare.clsa:tst:1709563938005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1709563938001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1710437162001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1710437162001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1710437162002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1710437162001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1710437162003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1710437162003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1710437162004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1710437162003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1710437162005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1710437162001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1710437162006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1710437162001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1711491615001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1711491615001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="unixODBC is earlier than 0:2.2.14-14.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1712262573001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1712262573001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="unixODBC isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1712262573002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="unixODBC isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1712262573003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="unixODBC-devel is earlier than 0:2.2.14-14.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1712262573004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1712262573001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="unixODBC-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1712262573005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="unixODBC-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1712262573006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="unixODBC-kde is earlier than 0:2.2.14-14.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1712262573007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1712262573001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="unixODBC-kde isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1712262573008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="unixODBC-kde isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1712262573009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1712262573007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="less is earlier than 0:436-13.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1713523278001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1713523278001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1713523278001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="less isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1713523278002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1713523278001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="less isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1713523278003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1713523278001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1715280966027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715280966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="less is earlier than 0:436-13.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1715946466001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1713523278001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1715946466001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ansible is earlier than 0:2.6.20-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1716287930001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1716287930001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1716287930001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ansible isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1716287930002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1716287930001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ansible isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1716287930003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1716287930001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ansible-doc is earlier than 0:2.6.20-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1716287930004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1716287930004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1716287930001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ansible-doc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1716287930005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1716287930004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="ansible-doc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1716287930006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1716287930004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1717694505007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1717694505002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1718901417007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1718901417002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1724705338001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724705338001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1724705338002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724705338001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1724705338003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724705338003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1724705338004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724705338003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1724705338005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724705338001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1724705338006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724705338001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1724774331001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1724774331008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1724774331002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-data is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-data isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-data isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-devel is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-filesystem is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-filesystem isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-filesystem isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-lib is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-lib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-lib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-milter is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-milter isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-milter isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-update is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-update isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamav-update isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamd is earlier than 0:0.103.11-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1725385588022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725385588013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1725385588023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="clamd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1725385588024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1725655852012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725655852001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1725993966001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725993966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1725993966002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1725993966001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.422.b05-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1726059935012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726059935001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1726655093001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1726655093011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1726655093002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1728071619001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728071619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1728071619002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728071619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1728071619003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728071619001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1728071619004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728071619004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1728071619005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728071619004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1728071619006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728071619004"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1728297376001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els18" id="oval:com.tuxcare.clsa:tst:1728297376011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728297376002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="microcode_ctl is earlier than 3:1.17-33.42.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1728582568001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262337001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1728582568001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1729628500027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1729628500001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1730139582027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1730139582001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-data is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-devel is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-filesystem is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-lib is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-milter is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamav-update is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="clamd is earlier than 0:0.103.12-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1732198712008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1725385588022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732198712005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1731956848001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1731956848001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-c++ is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1731956848002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1731956848001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-c++-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1731956848003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1731956848001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1731956848004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1731956848001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-doc is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1731956848005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1731956848005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-perl is earlier than 0:6.7.2.7-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1731956848006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1731956848005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1732702350001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732702350001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1732702216001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1732702216001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1733158910001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els19" id="oval:com.tuxcare.clsa:tst:1733158910011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733158910002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1733421975027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1733421975001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1734039943027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1734039943001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntp is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1735122554001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1735122554001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntp-doc is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1735122554002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1735122554002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntp-perl is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1735122554003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1735122554001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ntpdate is earlier than 0:4.2.6p5-16.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1735122554004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633442934010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1735122554001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1737153996001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1737153996001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1739292069001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els20" id="oval:com.tuxcare.clsa:tst:1739292069011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1739292069002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1740823970001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740823970001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-chroot is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1740823970002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740823970001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-devel is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1740823970003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740823970003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-libs is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1740823970004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740823970003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-sdb is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1740823970005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740823970001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="bind-utils is earlier than 33:9.8.2-0.68.rc1.el6.11.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1740823970006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261610016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740823970001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1740656525001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els21" id="oval:com.tuxcare.clsa:tst:1740656525011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1740656525002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1742232795001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1742232795001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1742232795002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1742232795002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1741636522001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1741636522001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1741636522002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1741636522001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1741636522003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1741636522003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1741636522004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1741636522003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1747057793001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1747057793001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1747057793002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1747057793001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1747057793003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1747057793003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1747057793004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1747057793003"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1748366748001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els22" id="oval:com.tuxcare.clsa:tst:1748366748011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748366748002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libipa_hbac is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libipa_hbac isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libipa_hbac isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libipa_hbac-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libipa_hbac-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libipa_hbac-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsss_idmap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_idmap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_idmap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsss_idmap-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_idmap-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_idmap-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsss_nss_idmap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_nss_idmap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_nss_idmap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsss_nss_idmap-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_nss_idmap-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_nss_idmap-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsss_simpleifp is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_simpleifp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_simpleifp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsss_simpleifp-devel is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_simpleifp-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="libsss_simpleifp-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libipa_hbac is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-libipa_hbac isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-libipa_hbac isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libsss_nss_idmap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-libsss_nss_idmap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-libsss_nss_idmap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-sss is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-sss isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-sss isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-sss-murmur is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-sss-murmur isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-sss-murmur isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-sssdconfig is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069037"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-sssdconfig isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="python-sssdconfig isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-ad is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-ad isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-ad isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-client is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-client isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069047" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-client isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069048" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-common is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069049" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069050" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069051" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-common-pac is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069052" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-common-pac isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069053" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-common-pac isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069054" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-dbus is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069055" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-dbus isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069056" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-dbus isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069057" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-ipa is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069058" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-ipa isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069059" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-ipa isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069060" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-krb5 is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069061" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-krb5 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069062" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-krb5 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069063" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-krb5-common is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069064" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-krb5-common isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069065" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-krb5-common isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069066" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-ldap is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069067" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-ldap isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069068" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-ldap isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069069" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-proxy is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069070" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-proxy isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069071" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-proxy isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069072" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sssd-tools is earlier than 0:1.13.3-60.0.4.el6_10.2.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1748947069073" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1748947069025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-tools isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1748947069074" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="sssd-tools isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1748947069075" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1748947069073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1750175787001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els23" id="oval:com.tuxcare.clsa:tst:1750175787011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1750175787002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1751134987001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751134987001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="rsync is earlier than 0:3.0.6-12.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1751612441001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1653004535001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612441001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.452.b09-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1751612332012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1751612332001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1752748974012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1752748974001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl is earlier than 4:5.10.1-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Extract is earlier than 1:0.38-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Archive-Tar is earlier than 0:1.58-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CGI is earlier than 0:3.51-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPAN is earlier than 0:1.9402-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-CPANPLUS is earlier than 0:0.88-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595006"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Raw-Zlib is earlier than 1:2.021-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595008"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Digest-SHA is earlier than 1:5.47-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595010"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-CBuilder is earlier than 1:0.27-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595011"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-Embed is earlier than 0:1.28-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595012"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-MakeMaker is earlier than 0:6.55-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595013"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-ExtUtils-ParseXS is earlier than 1:2.2003.0-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595014"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-File-Fetch is earlier than 0:0.26-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595015"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Base is earlier than 0:2.021-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Bzip2 is earlier than 0:2.021-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Compress-Zlib is earlier than 0:2.021-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595007"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IO-Zlib is earlier than 1:1.09-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595019"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-IPC-Cmd is earlier than 1:0.56-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595020"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Locale-Maketext-Simple is earlier than 1:0.18-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595021"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message is earlier than 1:0.02-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Log-Message-Simple is earlier than 0:0.04-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595023"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Build is earlier than 1:0.3500-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595024"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-CoreList is earlier than 0:2.18-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load is earlier than 1:0.16-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595026"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Load-Conditional is earlier than 0:0.30-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595027"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Loaded is earlier than 1:0.02-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595028" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005082"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Module-Pluggable is earlier than 1:3.90-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595029" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005085"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595029"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Object-Accessor is earlier than 1:0.34-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595030" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005088"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595030"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Package-Constants is earlier than 1:0.02-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595031" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005091"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595022"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Params-Check is earlier than 1:0.26-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595032" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005094"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595032"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Parse-CPAN-Meta is earlier than 1:1.40-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595033" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005097"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595033"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Escapes is earlier than 1:1.04-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595034" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005100"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595034"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Pod-Simple is earlier than 1:3.13-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595035" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005103"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595035"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Term-UI is earlier than 0:0.20-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595036" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005106"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595036"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Harness is earlier than 0:3.17-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595037" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005109"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595037"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Test-Simple is earlier than 0:0.92-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595038" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005112"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595038"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-HiRes is earlier than 4:1.9721-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595039" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005115"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595039"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Time-Piece is earlier than 0:1.15-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595040" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005118"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595040"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-core is earlier than 0:5.10.1-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595041" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005121"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595041"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-devel is earlier than 4:5.10.1-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595042" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005124"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-libs is earlier than 4:5.10.1-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595043" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005127"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595042"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-parent is earlier than 1:0.221-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595044" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005130"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595044"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-suidperl is earlier than 4:5.10.1-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595045" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005133"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-version is earlier than 3:0.77-146.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1753209595046" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1657561005136"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753209595046"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1753377886001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753377886001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1753377886002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753377886001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1753377886003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753377886003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1753377886004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753377886003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1753780501027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1753780501001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="lemon is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1754342507001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754342507001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1754342507002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754342507002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-devel is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1754342507003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754342507002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-doc is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1754342507004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754342507001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="sqlite-tcl is earlier than 0:3.6.20-1.el6_7.2.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1754342507005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1665428177013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754342507001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1754381382012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1754381382001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.462.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074145012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074145001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_dav_svn is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="mod_dav_svn isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="mod_dav_svn isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-devel is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-gnome is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-gnome isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-gnome isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-javahl is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-javahl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-javahl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-kde is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-kde isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-kde isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-perl is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-perl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-perl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-ruby is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-ruby isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-ruby isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="subversion-svn2cl is earlier than 0:1.6.11-15.el6_7.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755074254025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755074254025"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-svn2cl isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755074254026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="subversion-svn2cl isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755074254027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755074254025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1755184971012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755184971001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1755707175001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els24" id="oval:com.tuxcare.clsa:tst:1755707175011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755707175002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6 is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6 isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6 isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-admin-webapps is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-admin-webapps isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-admin-webapps isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-docs-webapp is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-docs-webapp isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-docs-webapp isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-el-2.1-api is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-el-2.1-api isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-el-2.1-api isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-javadoc is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-javadoc isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-javadoc isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-jsp-2.1-api is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-jsp-2.1-api isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-jsp-2.1-api isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-lib is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-lib isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-lib isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-servlet-2.5-api is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-servlet-2.5-api isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-servlet-2.5-api isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tomcat6-webapps is earlier than 0:6.0.24-115.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755513827025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755513827001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-webapps isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755513827026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="tomcat6-webapps isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755513827027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755513827025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dmidecode is earlier than 1:2.12-7.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1755271747001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755271747001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1755271747001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dmidecode isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1755271747002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755271747001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="dmidecode isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1755271747003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1755271747001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="wget is earlier than 0:1.12-10.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1756409922001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1756409922001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756409922001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="wget isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1756409922002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1756409922001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="wget isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1756409922003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1756409922001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-bcmath is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-cli is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-common is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-dba is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-devel is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-embedded is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-enchant is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-fpm is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-gd is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-imap is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-intl is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-ldap is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mbstring is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193040"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-mysql is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193043"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-odbc is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990016" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193046"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pdo is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990017" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193049"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pgsql is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990018" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193052"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-process is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990019" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193055"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-pspell is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990020" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193058"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-recode is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990021" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193061"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-snmp is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990022" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193064"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-soap is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990023" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193067"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-tidy is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990024" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193070"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xml is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990025" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193073"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-xmlrpc is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990026" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193076"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="php-zts is earlier than 0:5.3.3-55.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1756483990027" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1637673193079"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1756483990001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757016520001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757016520001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els14" id="oval:com.tuxcare.clsa:tst:1757076484001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757076484001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1757608775001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757608775001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1757608775002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757608775001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1757608775003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757608775001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1757608775004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757608775004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1757608775005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757608775004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1757608775006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757608775004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd is earlier than 0:2.2.15-72.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1758035415001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758035415001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-devel is earlier than 0:2.2.15-72.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1758035415002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758035415002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-manual is earlier than 0:2.2.15-72.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1758035415003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758035415003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="httpd-tools is earlier than 0:2.2.15-72.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1758035415004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758035415001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="mod_ssl is earlier than 1:2.2.15-72.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1758035415005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1633601543013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758035415005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1757700075007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1757700075002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1758010245001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els25" id="oval:com.tuxcare.clsa:tst:1758010245011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758010245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cups is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758796854001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758796854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1758796854002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1758796854003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cups-devel is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758796854004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758796854004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-devel isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1758796854005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-devel isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1758796854006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cups-libs is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758796854007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758796854004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-libs isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1758796854008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-libs isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1758796854009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cups-lpd is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758796854010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758796854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-lpd isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1758796854011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-lpd isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1758796854012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="cups-php is earlier than 1:1.4.2-81.el6_10.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758796854013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758796854001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-php isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1758796854014" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="cups-php isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1758796854015" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796854013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="spamassassin is earlier than 0:3.3.1-3.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758796775001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796775001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758796775001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="spamassassin isn't signed with CentOS 6 key" id="oval:com.tuxcare.clsa:tst:1758796775002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796775001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="none satisfy" comment="spamassassin isn't signed with Tuxcare ELS key" id="oval:com.tuxcare.clsa:tst:1758796775003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1758796775001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1611743864004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-common is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-devel is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-headers is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-static is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glibc-utils is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nscd is earlier than 0:2.12-2.215.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1758711950007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1629395067019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758711950002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap is earlier than 0:2.4.58-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645818001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645818001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-clients is earlier than 0:2.4.58-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645818002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645818002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-devel is earlier than 0:2.4.58-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645818003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645818001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers is earlier than 0:2.4.58-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645818004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645818002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openldap-servers-sql is earlier than 0:2.4.58-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645818005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803748013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645818002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1758709468001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758709468001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1758709468002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758709468001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1758709468003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758709468003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1758709468004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758709468004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp is earlier than 0:0.4.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758645375001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645375001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-devel is earlier than 0:0.4.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758645375002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645375001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-java is earlier than 0:0.4.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758645375003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645375003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-tools is earlier than 0:0.4.3-3.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758645375004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645375003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot is earlier than 1:2.0.9-23.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645976001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645976001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-devel is earlier than 1:2.0.9-23.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645976002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645976001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-mysql is earlier than 1:2.0.9-23.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645976003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645976003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-pgsql is earlier than 1:2.0.9-23.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645976004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645976003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-pigeonhole is earlier than 1:2.0.9-23.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1758645976005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758645976003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot is earlier than 1:2.0.9-23.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758896552001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896552001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-devel is earlier than 1:2.0.9-23.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758896552002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896552001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-mysql is earlier than 1:2.0.9-23.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758896552003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896552003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-pgsql is earlier than 1:2.0.9-23.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758896552004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896552003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="dovecot-pigeonhole is earlier than 1:2.0.9-23.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1758896552005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1634573745013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896552003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1758896647001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896647001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1758896647002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896647001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1758896647003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896647003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els5" id="oval:com.tuxcare.clsa:tst:1758896647004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1758896647004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp is earlier than 0:0.4.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1759154304001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759154304001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-devel is earlier than 0:0.4.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1759154304002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759154304001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-java is earlier than 0:0.4.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1759154304003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759154304003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libwebp-tools is earlier than 0:0.4.3-3.el6.tuxcare.els3" id="oval:com.tuxcare.clsa:tst:1759154304004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1697136085010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759154304003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1759336759001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759336759001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1759336759002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759336759001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1759336759003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759336759003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1759336759004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759336759003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsmbclient is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libsmbclient-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-client is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-common is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-doc is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-domainjoin-gui is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-glusterfs is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-swat is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-clients is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-devel is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="samba-winbind-krb5-locator is earlier than 0:3.6.23-53.el6_10.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1759433716013" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1692293238037"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759433716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openvpn is earlier than 0:2.4.9-1.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1759485890001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759485890001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openvpn-devel is earlier than 0:2.4.9-1.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1759485890002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649171018004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1759485890002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss is earlier than 0:3.44.0-12.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1760112150001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-devel is earlier than 0:3.44.0-12.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1760112150002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-pkcs11-devel is earlier than 0:3.44.0-12.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1760112150003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112150001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-sysinit is earlier than 0:3.44.0-12.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1760112150004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112150004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="nss-tools is earlier than 0:3.44.0-12.el6.tuxcare.els8" id="oval:com.tuxcare.clsa:tst:1760112150005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1640002354013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112150004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1760112341001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112341001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els9" id="oval:com.tuxcare.clsa:tst:1760112341002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760112341002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl is earlier than 0:1.0.1e-63.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1760559298001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760559298001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-devel is earlier than 0:1.0.1e-63.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1760559298002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760559298001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-perl is earlier than 0:1.0.1e-63.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1760559298003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760559298003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="openssl-static is earlier than 0:1.0.1e-63.el6.tuxcare.els13" id="oval:com.tuxcare.clsa:tst:1760559298004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724134010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1760559298003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1761139574001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1761139574002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139574001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1761139574003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139574003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1761139574004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139574003"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1762454401001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els27" id="oval:com.tuxcare.clsa:tst:1762454401011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1762454401002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1761139764001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els26" id="oval:com.tuxcare.clsa:tst:1761139764011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761139764002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2 is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1761859779001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761859779001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-devel is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1761859779002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761859779001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-python is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1761859779003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761859779003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libxml2-static is earlier than 0:2.7.6-21.el6_8.1.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1761859779004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1641903536010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1761859779003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els15" id="oval:com.tuxcare.clsa:tst:1763543346001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1763543346001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1763397982001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1763397982001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="emacs-git-el is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-all is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-cvs is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-daemon is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-email is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-gui is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="git-svn is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitk is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="gitweb is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perl-Git is earlier than 0:1.7.1-10.el6_10.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1767973696012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1677231280034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1767973696001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1768669128001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els28" id="oval:com.tuxcare.clsa:tst:1768669128011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1768669128002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1770734656001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1770734656001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1770734656002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1770734656001"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1771238245001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els29" id="oval:com.tuxcare.clsa:tst:1771238245011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771238245002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2 is earlier than 0:2.28.8-12.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1771580716001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771580716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-devel is earlier than 0:2.28.8-12.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1771580716002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771580716001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-doc is earlier than 0:2.28.8-12.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1771580716003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771580716003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="glib2-static is earlier than 0:2.28.8-12.el6.tuxcare.els6" id="oval:com.tuxcare.clsa:tst:1771580716004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1623075923010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771580716004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1771926895001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771926895001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1771926895002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771926895001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1771926895003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771926895001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1771926895004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771926895004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1771926895005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771926895004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1771926895006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1771926895004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip is earlier than 0:1.2.3-29.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1772454796001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772454796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="minizip-devel is earlier than 0:1.2.3-29.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1772454796002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772454796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib is earlier than 0:1.2.3-29.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1772454796003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772454796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-devel is earlier than 0:1.2.3-29.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1772454796004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772454796001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="zlib-static is earlier than 0:1.2.3-29.el6.tuxcare.els4" id="oval:com.tuxcare.clsa:tst:1772454796005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1652706231013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772454796005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python is earlier than 0:2.6.6-70.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1772577130001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772577130001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-devel is earlier than 0:2.6.6-70.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1772577130002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772577130001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-libs is earlier than 0:2.6.6-70.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1772577130003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772577130001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-test is earlier than 0:2.6.6-70.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1772577130004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772577130004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-tools is earlier than 0:2.6.6-70.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1772577130005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772577130004"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="tkinter is earlier than 0:2.6.6-70.el6.tuxcare.els17" id="oval:com.tuxcare.clsa:tst:1772577130006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1616001357016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1772577130004"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1773043650001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els30" id="oval:com.tuxcare.clsa:tst:1773043650011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773043650002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-demo-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-devel-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184019"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-headless-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184022"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184025"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-javadoc-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184028"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968009"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184031"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="java-1.8.0-openjdk-src-debug is earlier than 1:1.8.0.482.b08-1.el6.tuxcare.els1" id="oval:com.tuxcare.clsa:tst:1773506968012" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262184034"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506968001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" id="oval:com.tuxcare.clsa:tst:1773506143001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506143001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" id="oval:com.tuxcare.clsa:tst:1773506143002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506143001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" id="oval:com.tuxcare.clsa:tst:1773506143003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506143001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" id="oval:com.tuxcare.clsa:tst:1773506143004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506143001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els47" id="oval:com.tuxcare.clsa:tst:1773506143005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1773506143001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat is earlier than 0:2.0.1-13.el6_8.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1774021165001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774021165001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="expat-devel is earlier than 0:2.0.1-13.el6_8.tuxcare.els7" id="oval:com.tuxcare.clsa:tst:1774021165002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1660762248004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774021165001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="curl is earlier than 0:7.19.7-59.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1774276586001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774276586001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl is earlier than 0:7.19.7-59.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1774276586002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774276586002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="libcurl-devel is earlier than 0:7.19.7-59.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1774276586003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1608724009007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774276586002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-X11 is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" id="oval:com.tuxcare.clsa:tst:1774432816001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774432816001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-common is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" id="oval:com.tuxcare.clsa:tst:1774432816002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774432816001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-enhanced is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" id="oval:com.tuxcare.clsa:tst:1774432816003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774432816001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-filesystem is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" id="oval:com.tuxcare.clsa:tst:1774432816004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774432816001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="vim-minimal is earlier than 3:7.4.629-5.2.el6.tuxcare.els48" id="oval:com.tuxcare.clsa:tst:1774432816005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1649170979013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774432816001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid is earlier than 7:3.1.23-30.el6.tuxcare.els16" id="oval:com.tuxcare.clsa:tst:1774946829001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650575956001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1774946829001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1775148022001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775148022001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els10" id="oval:com.tuxcare.clsa:tst:1775148022002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775148022002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="squid34 is earlier than 7:3.4.14-16.el6.tuxcare.els12" id="oval:com.tuxcare.clsa:tst:1775062580001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632262221001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775062580001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1775725743001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775725743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-c++ is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1775725743002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775725743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-c++-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1775725743003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265007"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775725743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-devel is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1775725743004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265010"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775725743001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-doc is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1775725743005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265013"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775725743005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="ImageMagick-perl is earlier than 0:6.7.2.7-7.el6.tuxcare.els2" id="oval:com.tuxcare.clsa:tst:1775725743006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1617641265016"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775725743005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1775722568001" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775722568001"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="binutils-devel is earlier than 1:2.20.51.0.2-5.48.1.el6.tuxcare.els11" id="oval:com.tuxcare.clsa:tst:1775722568002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1638803819004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775722568002"/>
    </red-def:rpminfo_test>
    <unix-def:uname_test check="none satisfy" comment="kernel earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31 (or unknown) is currently running" id="oval:com.tuxcare.clsa:tst:1775745943001" version="1">
      <unix-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075001"/>
      <unix-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943001"/>
    </unix-def:uname_test>
    <red-def:rpminfo_test check="at least one" comment="kernel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943002" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075002"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-abi-whitelists is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943003" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912001"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943004" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075005"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-debug-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943005" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075008"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943005"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-devel is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943006" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075011"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-doc is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943007" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1632261912004"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-firmware is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943008" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075014"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943003"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="kernel-headers is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943009" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075017"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943010" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075020"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943002"/>
    </red-def:rpminfo_test>
    <red-def:rpminfo_test check="at least one" comment="python-perf is earlier than 0:2.6.32-754.35.8.el6.tuxcare.els31" id="oval:com.tuxcare.clsa:tst:1775745943011" version="1">
      <red-def:object object_ref="oval:com.tuxcare.clsa:obj:1650576075023"/>
      <red-def:state state_ref="oval:com.tuxcare.clsa:ste:1775745943002"/>
    </red-def:rpminfo_test>
  </tests>
  <objects>
    <ind-def:textfilecontent54_object id="oval:com.tuxcare.clsa:obj:1611743864001" version="1">
      <ind-def:filepath datatype="string">/etc/els-release</ind-def:filepath>
      <ind-def:pattern operation="pattern match">CentOS release 6\.10 \(Final, ELS by Cloudlinux\)</ind-def:pattern>
      <ind-def:instance datatype="int">1</ind-def:instance>
    </ind-def:textfilecontent54_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1611743864002" version="1">
      <red-def:name>sudo</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1611743864005" version="1">
      <red-def:name>sudo-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650910003001" version="1">
      <red-def:name>bash</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650910003004" version="1">
      <red-def:name>bash-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1653005178001" version="1">
      <red-def:name>gzip</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261610001" version="1">
      <red-def:name>bind</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261610004" version="1">
      <red-def:name>bind-chroot</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261610007" version="1">
      <red-def:name>bind-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261610010" version="1">
      <red-def:name>bind-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261610013" version="1">
      <red-def:name>bind-sdb</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261610016" version="1">
      <red-def:name>bind-utils</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650376937001" version="1">
      <red-def:name>busybox</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650376937004" version="1">
      <red-def:name>busybox-petitboot</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633601543001" version="1">
      <red-def:name>httpd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633601543004" version="1">
      <red-def:name>httpd-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633601543007" version="1">
      <red-def:name>httpd-manual</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633601543010" version="1">
      <red-def:name>httpd-tools</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633601543013" version="1">
      <red-def:name>mod_ssl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724009001" version="1">
      <red-def:name>curl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724009004" version="1">
      <red-def:name>libcurl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724009007" version="1">
      <red-def:name>libcurl-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654107183001" version="1">
      <red-def:name>cyrus-imapd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654107183004" version="1">
      <red-def:name>cyrus-imapd-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654107183007" version="1">
      <red-def:name>cyrus-imapd-utils</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075541001" version="1">
      <red-def:name>dhclient</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075541004" version="1">
      <red-def:name>dhcp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075541007" version="1">
      <red-def:name>dhcp-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075541010" version="1">
      <red-def:name>dhcp-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1634573745001" version="1">
      <red-def:name>dovecot</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1634573745004" version="1">
      <red-def:name>dovecot-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1634573745007" version="1">
      <red-def:name>dovecot-mysql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1634573745010" version="1">
      <red-def:name>dovecot-pgsql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1634573745013" version="1">
      <red-def:name>dovecot-pigeonhole</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1635439636001" version="1">
      <red-def:name>gd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1635439636004" version="1">
      <red-def:name>gd-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1635439636007" version="1">
      <red-def:name>gd-progs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075923001" version="1">
      <red-def:name>glib2</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075923004" version="1">
      <red-def:name>glib2-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075923007" version="1">
      <red-def:name>glib2-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1623075923010" version="1">
      <red-def:name>glib2-static</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067001" version="1">
      <red-def:name>glibc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067004" version="1">
      <red-def:name>glibc-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067007" version="1">
      <red-def:name>glibc-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067010" version="1">
      <red-def:name>glibc-headers</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067013" version="1">
      <red-def:name>glibc-static</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067016" version="1">
      <red-def:name>glibc-utils</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1629395067019" version="1">
      <red-def:name>nscd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1624372464001" version="1">
      <red-def:name>hivex</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1624372464004" version="1">
      <red-def:name>hivex-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1624372464007" version="1">
      <red-def:name>ocaml-hivex</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1624372464010" version="1">
      <red-def:name>ocaml-hivex-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1624372464013" version="1">
      <red-def:name>perl-hivex</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1624372464016" version="1">
      <red-def:name>python-hivex</red-def:name>
    </red-def:rpminfo_object>
    <unix-def:uname_object id="oval:com.tuxcare.clsa:obj:1650576075001" version="1"/>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075002" version="1">
      <red-def:name>kernel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075005" version="1">
      <red-def:name>kernel-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075008" version="1">
      <red-def:name>kernel-debug-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075011" version="1">
      <red-def:name>kernel-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075014" version="1">
      <red-def:name>kernel-firmware</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075017" version="1">
      <red-def:name>kernel-headers</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075020" version="1">
      <red-def:name>perf</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650576075023" version="1">
      <red-def:name>python-perf</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261912001" version="1">
      <red-def:name>kernel-abi-whitelists</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261912004" version="1">
      <red-def:name>kernel-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797001" version="1">
      <red-def:name>cyrus-sasl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797004" version="1">
      <red-def:name>cyrus-sasl-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797007" version="1">
      <red-def:name>cyrus-sasl-gssapi</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797010" version="1">
      <red-def:name>cyrus-sasl-ldap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797013" version="1">
      <red-def:name>cyrus-sasl-lib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797016" version="1">
      <red-def:name>cyrus-sasl-md5</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797019" version="1">
      <red-def:name>cyrus-sasl-ntlm</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797022" version="1">
      <red-def:name>cyrus-sasl-plain</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1646060797025" version="1">
      <red-def:name>cyrus-sasl-sql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1642429400001" version="1">
      <red-def:name>log4j</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1642429400004" version="1">
      <red-def:name>log4j-javadoc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1642429400007" version="1">
      <red-def:name>log4j-manual</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762001" version="1">
      <red-def:name>nginx</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762004" version="1">
      <red-def:name>nginx-all-modules</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762007" version="1">
      <red-def:name>nginx-filesystem</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762010" version="1">
      <red-def:name>nginx-mod-http-geoip</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762013" version="1">
      <red-def:name>nginx-mod-http-image-filter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762016" version="1">
      <red-def:name>nginx-mod-http-perl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762019" version="1">
      <red-def:name>nginx-mod-http-xslt-filter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762022" version="1">
      <red-def:name>nginx-mod-mail</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632261762025" version="1">
      <red-def:name>nginx-mod-stream</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1656962023001" version="1">
      <red-def:name>openssh</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1656962023004" version="1">
      <red-def:name>openssh-askpass</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1656962023007" version="1">
      <red-def:name>openssh-clients</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1656962023010" version="1">
      <red-def:name>openssh-ldap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1656962023013" version="1">
      <red-def:name>openssh-server</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1656962023016" version="1">
      <red-def:name>pam_ssh_agent_auth</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633442934001" version="1">
      <red-def:name>ntp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633442934004" version="1">
      <red-def:name>ntp-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633442934007" version="1">
      <red-def:name>ntp-perl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1633442934010" version="1">
      <red-def:name>ntpdate</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724134001" version="1">
      <red-def:name>openssl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724134004" version="1">
      <red-def:name>openssl-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724134007" version="1">
      <red-def:name>openssl-perl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1608724134010" version="1">
      <red-def:name>openssl-static</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005001" version="1">
      <red-def:name>perl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005004" version="1">
      <red-def:name>perl-Archive-Extract</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005007" version="1">
      <red-def:name>perl-Archive-Tar</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005010" version="1">
      <red-def:name>perl-CGI</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005013" version="1">
      <red-def:name>perl-CPAN</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005016" version="1">
      <red-def:name>perl-CPANPLUS</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005019" version="1">
      <red-def:name>perl-Compress-Raw-Bzip2</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005022" version="1">
      <red-def:name>perl-Compress-Raw-Zlib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005025" version="1">
      <red-def:name>perl-Compress-Zlib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005028" version="1">
      <red-def:name>perl-Digest-SHA</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005031" version="1">
      <red-def:name>perl-ExtUtils-CBuilder</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005034" version="1">
      <red-def:name>perl-ExtUtils-Embed</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005037" version="1">
      <red-def:name>perl-ExtUtils-MakeMaker</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005040" version="1">
      <red-def:name>perl-ExtUtils-ParseXS</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005043" version="1">
      <red-def:name>perl-File-Fetch</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005046" version="1">
      <red-def:name>perl-IO-Compress-Base</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005049" version="1">
      <red-def:name>perl-IO-Compress-Bzip2</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005052" version="1">
      <red-def:name>perl-IO-Compress-Zlib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005055" version="1">
      <red-def:name>perl-IO-Zlib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005058" version="1">
      <red-def:name>perl-IPC-Cmd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005061" version="1">
      <red-def:name>perl-Locale-Maketext-Simple</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005064" version="1">
      <red-def:name>perl-Log-Message</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005067" version="1">
      <red-def:name>perl-Log-Message-Simple</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005070" version="1">
      <red-def:name>perl-Module-Build</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005073" version="1">
      <red-def:name>perl-Module-CoreList</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005076" version="1">
      <red-def:name>perl-Module-Load</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005079" version="1">
      <red-def:name>perl-Module-Load-Conditional</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005082" version="1">
      <red-def:name>perl-Module-Loaded</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005085" version="1">
      <red-def:name>perl-Module-Pluggable</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005088" version="1">
      <red-def:name>perl-Object-Accessor</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005091" version="1">
      <red-def:name>perl-Package-Constants</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005094" version="1">
      <red-def:name>perl-Params-Check</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005097" version="1">
      <red-def:name>perl-Parse-CPAN-Meta</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005100" version="1">
      <red-def:name>perl-Pod-Escapes</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005103" version="1">
      <red-def:name>perl-Pod-Simple</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005106" version="1">
      <red-def:name>perl-Term-UI</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005109" version="1">
      <red-def:name>perl-Test-Harness</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005112" version="1">
      <red-def:name>perl-Test-Simple</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005115" version="1">
      <red-def:name>perl-Time-HiRes</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005118" version="1">
      <red-def:name>perl-Time-Piece</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005121" version="1">
      <red-def:name>perl-core</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005124" version="1">
      <red-def:name>perl-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005127" version="1">
      <red-def:name>perl-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005130" version="1">
      <red-def:name>perl-parent</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005133" version="1">
      <red-def:name>perl-suidperl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1657561005136" version="1">
      <red-def:name>perl-version</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1616001357001" version="1">
      <red-def:name>python</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1616001357004" version="1">
      <red-def:name>python-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1616001357007" version="1">
      <red-def:name>python-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1616001357010" version="1">
      <red-def:name>python-test</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1616001357013" version="1">
      <red-def:name>python-tools</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1616001357016" version="1">
      <red-def:name>tkinter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193001" version="1">
      <red-def:name>php</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193004" version="1">
      <red-def:name>php-bcmath</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193007" version="1">
      <red-def:name>php-cli</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193010" version="1">
      <red-def:name>php-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193013" version="1">
      <red-def:name>php-dba</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193016" version="1">
      <red-def:name>php-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193019" version="1">
      <red-def:name>php-embedded</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193022" version="1">
      <red-def:name>php-enchant</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193025" version="1">
      <red-def:name>php-fpm</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193028" version="1">
      <red-def:name>php-gd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193031" version="1">
      <red-def:name>php-imap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193034" version="1">
      <red-def:name>php-intl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193037" version="1">
      <red-def:name>php-ldap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193040" version="1">
      <red-def:name>php-mbstring</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193043" version="1">
      <red-def:name>php-mysql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193046" version="1">
      <red-def:name>php-odbc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193049" version="1">
      <red-def:name>php-pdo</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193052" version="1">
      <red-def:name>php-pgsql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193055" version="1">
      <red-def:name>php-process</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193058" version="1">
      <red-def:name>php-pspell</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193061" version="1">
      <red-def:name>php-recode</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193064" version="1">
      <red-def:name>php-snmp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193067" version="1">
      <red-def:name>php-soap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193070" version="1">
      <red-def:name>php-tidy</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193073" version="1">
      <red-def:name>php-xml</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193076" version="1">
      <red-def:name>php-xmlrpc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1637673193079" version="1">
      <red-def:name>php-zts</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643112395001" version="1">
      <red-def:name>quagga</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643112395004" version="1">
      <red-def:name>quagga-contrib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643112395007" version="1">
      <red-def:name>quagga-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1640002354001" version="1">
      <red-def:name>nss</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1640002354004" version="1">
      <red-def:name>nss-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1640002354007" version="1">
      <red-def:name>nss-pkcs11-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1640002354010" version="1">
      <red-def:name>nss-sysinit</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1640002354013" version="1">
      <red-def:name>nss-tools</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1641903536001" version="1">
      <red-def:name>libxml2</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1641903536004" version="1">
      <red-def:name>libxml2-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1641903536007" version="1">
      <red-def:name>libxml2-python</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1641903536010" version="1">
      <red-def:name>libxml2-static</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1653004535001" version="1">
      <red-def:name>rsync</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777001" version="1">
      <red-def:name>rsyslog</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777004" version="1">
      <red-def:name>rsyslog-gnutls</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777007" version="1">
      <red-def:name>rsyslog-gssapi</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777010" version="1">
      <red-def:name>rsyslog-mysql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777013" version="1">
      <red-def:name>rsyslog-pgsql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777016" version="1">
      <red-def:name>rsyslog-relp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1654717777019" version="1">
      <red-def:name>rsyslog-snmp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649170979001" version="1">
      <red-def:name>vim-X11</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649170979004" version="1">
      <red-def:name>vim-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649170979007" version="1">
      <red-def:name>vim-enhanced</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649170979010" version="1">
      <red-def:name>vim-filesystem</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649170979013" version="1">
      <red-def:name>vim-minimal</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1652706231001" version="1">
      <red-def:name>minizip</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1652706231004" version="1">
      <red-def:name>minizip-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1652706231007" version="1">
      <red-def:name>zlib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1652706231010" version="1">
      <red-def:name>zlib-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1652706231013" version="1">
      <red-def:name>zlib-static</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184001" version="1">
      <red-def:name>java-1.8.0-openjdk</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184004" version="1">
      <red-def:name>java-1.8.0-openjdk-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184007" version="1">
      <red-def:name>java-1.8.0-openjdk-demo</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184010" version="1">
      <red-def:name>java-1.8.0-openjdk-demo-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184013" version="1">
      <red-def:name>java-1.8.0-openjdk-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184016" version="1">
      <red-def:name>java-1.8.0-openjdk-devel-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184019" version="1">
      <red-def:name>java-1.8.0-openjdk-headless</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184022" version="1">
      <red-def:name>java-1.8.0-openjdk-headless-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184025" version="1">
      <red-def:name>java-1.8.0-openjdk-javadoc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184028" version="1">
      <red-def:name>java-1.8.0-openjdk-javadoc-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184031" version="1">
      <red-def:name>java-1.8.0-openjdk-src</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262184034" version="1">
      <red-def:name>java-1.8.0-openjdk-src-debug</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262221001" version="1">
      <red-def:name>squid34</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1632262337001" version="1">
      <red-def:name>microcode_ctl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650575983001" version="1">
      <red-def:name>xterm</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803819001" version="1">
      <red-def:name>binutils</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803819004" version="1">
      <red-def:name>binutils-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649171018001" version="1">
      <red-def:name>openvpn</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1649171018004" version="1">
      <red-def:name>openvpn-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803748001" version="1">
      <red-def:name>openldap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803748004" version="1">
      <red-def:name>openldap-clients</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803748007" version="1">
      <red-def:name>openldap-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803748010" version="1">
      <red-def:name>openldap-servers</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1638803748013" version="1">
      <red-def:name>openldap-servers-sql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1650575956001" version="1">
      <red-def:name>squid</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1617641265001" version="1">
      <red-def:name>ImageMagick</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1617641265004" version="1">
      <red-def:name>ImageMagick-c++</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1617641265007" version="1">
      <red-def:name>ImageMagick-c++-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1617641265010" version="1">
      <red-def:name>ImageMagick-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1617641265013" version="1">
      <red-def:name>ImageMagick-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1617641265016" version="1">
      <red-def:name>ImageMagick-perl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643211942001" version="1">
      <red-def:name>polkit</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643211942004" version="1">
      <red-def:name>polkit-desktop-policy</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643211942007" version="1">
      <red-def:name>polkit-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1643211942010" version="1">
      <red-def:name>polkit-docs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1618497131001" version="1">
      <red-def:name>screen</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660761670001" version="1">
      <red-def:name>exim</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660761670004" version="1">
      <red-def:name>exim-greylist</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660761670007" version="1">
      <red-def:name>exim-mon</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660761670010" version="1">
      <red-def:name>exim-mysql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660761670013" version="1">
      <red-def:name>exim-pgsql</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660762248001" version="1">
      <red-def:name>expat</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1660762248004" version="1">
      <red-def:name>expat-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1661176564001" version="1">
      <red-def:name>java-1.7.0-openjdk</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1661176564004" version="1">
      <red-def:name>java-1.7.0-openjdk-demo</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1661176564007" version="1">
      <red-def:name>java-1.7.0-openjdk-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1661176564010" version="1">
      <red-def:name>java-1.7.0-openjdk-javadoc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1661176564013" version="1">
      <red-def:name>java-1.7.0-openjdk-src</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1665428177001" version="1">
      <red-def:name>lemon</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1665428177004" version="1">
      <red-def:name>sqlite</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1665428177007" version="1">
      <red-def:name>sqlite-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1665428177010" version="1">
      <red-def:name>sqlite-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1665428177013" version="1">
      <red-def:name>sqlite-tcl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451001" version="1">
      <red-def:name>krb5-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451004" version="1">
      <red-def:name>krb5-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451007" version="1">
      <red-def:name>krb5-pkinit-openssl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451010" version="1">
      <red-def:name>krb5-server</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451013" version="1">
      <red-def:name>krb5-server-ldap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451016" version="1">
      <red-def:name>krb5-workstation</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1670874451019" version="1">
      <red-def:name>libkadm5</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280001" version="1">
      <red-def:name>emacs-git</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280004" version="1">
      <red-def:name>emacs-git-el</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280007" version="1">
      <red-def:name>git</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280010" version="1">
      <red-def:name>git-all</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280013" version="1">
      <red-def:name>git-cvs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280016" version="1">
      <red-def:name>git-daemon</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280019" version="1">
      <red-def:name>git-email</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280022" version="1">
      <red-def:name>git-gui</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280025" version="1">
      <red-def:name>git-svn</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280028" version="1">
      <red-def:name>gitk</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280031" version="1">
      <red-def:name>gitweb</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677231280034" version="1">
      <red-def:name>perl-Git</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1677791921001" version="1">
      <red-def:name>tar</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1685377120001" version="1">
      <red-def:name>sysstat</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293040001" version="1">
      <red-def:name>amanda</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293040004" version="1">
      <red-def:name>amanda-client</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293040007" version="1">
      <red-def:name>amanda-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293040010" version="1">
      <red-def:name>amanda-server</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238001" version="1">
      <red-def:name>libsmbclient</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238004" version="1">
      <red-def:name>libsmbclient-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238007" version="1">
      <red-def:name>samba</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238010" version="1">
      <red-def:name>samba-client</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238013" version="1">
      <red-def:name>samba-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238016" version="1">
      <red-def:name>samba-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238019" version="1">
      <red-def:name>samba-domainjoin-gui</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238022" version="1">
      <red-def:name>samba-glusterfs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238025" version="1">
      <red-def:name>samba-swat</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238028" version="1">
      <red-def:name>samba-winbind</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238031" version="1">
      <red-def:name>samba-winbind-clients</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238034" version="1">
      <red-def:name>samba-winbind-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1692293238037" version="1">
      <red-def:name>samba-winbind-krb5-locator</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1695835423001" version="1">
      <red-def:name>libssh2</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1695835423004" version="1">
      <red-def:name>libssh2-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1695835423007" version="1">
      <red-def:name>libssh2-docs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1697136085001" version="1">
      <red-def:name>libwebp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1697136085004" version="1">
      <red-def:name>libwebp-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1697136085007" version="1">
      <red-def:name>libwebp-java</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1697136085010" version="1">
      <red-def:name>libwebp-tools</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1701445092001" version="1">
      <red-def:name>libksba</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1701445092004" version="1">
      <red-def:name>libksba-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1703183093001" version="1">
      <red-def:name>haproxy</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1712262573001" version="1">
      <red-def:name>unixODBC</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1712262573004" version="1">
      <red-def:name>unixODBC-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1712262573007" version="1">
      <red-def:name>unixODBC-kde</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1713523278001" version="1">
      <red-def:name>less</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1716287930001" version="1">
      <red-def:name>ansible</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1716287930004" version="1">
      <red-def:name>ansible-doc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588001" version="1">
      <red-def:name>clamav</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588004" version="1">
      <red-def:name>clamav-data</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588007" version="1">
      <red-def:name>clamav-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588010" version="1">
      <red-def:name>clamav-filesystem</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588013" version="1">
      <red-def:name>clamav-lib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588016" version="1">
      <red-def:name>clamav-milter</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588019" version="1">
      <red-def:name>clamav-update</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1725385588022" version="1">
      <red-def:name>clamd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069001" version="1">
      <red-def:name>libipa_hbac</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069004" version="1">
      <red-def:name>libipa_hbac-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069007" version="1">
      <red-def:name>libsss_idmap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069010" version="1">
      <red-def:name>libsss_idmap-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069013" version="1">
      <red-def:name>libsss_nss_idmap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069016" version="1">
      <red-def:name>libsss_nss_idmap-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069019" version="1">
      <red-def:name>libsss_simpleifp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069022" version="1">
      <red-def:name>libsss_simpleifp-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069025" version="1">
      <red-def:name>python-libipa_hbac</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069028" version="1">
      <red-def:name>python-libsss_nss_idmap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069031" version="1">
      <red-def:name>python-sss</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069034" version="1">
      <red-def:name>python-sss-murmur</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069037" version="1">
      <red-def:name>python-sssdconfig</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069040" version="1">
      <red-def:name>sssd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069043" version="1">
      <red-def:name>sssd-ad</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069046" version="1">
      <red-def:name>sssd-client</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069049" version="1">
      <red-def:name>sssd-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069052" version="1">
      <red-def:name>sssd-common-pac</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069055" version="1">
      <red-def:name>sssd-dbus</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069058" version="1">
      <red-def:name>sssd-ipa</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069061" version="1">
      <red-def:name>sssd-krb5</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069064" version="1">
      <red-def:name>sssd-krb5-common</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069067" version="1">
      <red-def:name>sssd-ldap</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069070" version="1">
      <red-def:name>sssd-proxy</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1748947069073" version="1">
      <red-def:name>sssd-tools</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254001" version="1">
      <red-def:name>mod_dav_svn</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254004" version="1">
      <red-def:name>subversion</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254007" version="1">
      <red-def:name>subversion-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254010" version="1">
      <red-def:name>subversion-gnome</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254013" version="1">
      <red-def:name>subversion-javahl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254016" version="1">
      <red-def:name>subversion-kde</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254019" version="1">
      <red-def:name>subversion-perl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254022" version="1">
      <red-def:name>subversion-ruby</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755074254025" version="1">
      <red-def:name>subversion-svn2cl</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827001" version="1">
      <red-def:name>tomcat6</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827004" version="1">
      <red-def:name>tomcat6-admin-webapps</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827007" version="1">
      <red-def:name>tomcat6-docs-webapp</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827010" version="1">
      <red-def:name>tomcat6-el-2.1-api</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827013" version="1">
      <red-def:name>tomcat6-javadoc</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827016" version="1">
      <red-def:name>tomcat6-jsp-2.1-api</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827019" version="1">
      <red-def:name>tomcat6-lib</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827022" version="1">
      <red-def:name>tomcat6-servlet-2.5-api</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755513827025" version="1">
      <red-def:name>tomcat6-webapps</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1755271747001" version="1">
      <red-def:name>dmidecode</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1756409922001" version="1">
      <red-def:name>wget</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1758796854001" version="1">
      <red-def:name>cups</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1758796854004" version="1">
      <red-def:name>cups-devel</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1758796854007" version="1">
      <red-def:name>cups-libs</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1758796854010" version="1">
      <red-def:name>cups-lpd</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1758796854013" version="1">
      <red-def:name>cups-php</red-def:name>
    </red-def:rpminfo_object>
    <red-def:rpminfo_object id="oval:com.tuxcare.clsa:obj:1758796775001" version="1">
      <red-def:name>spamassassin</red-def:name>
    </red-def:rpminfo_object>
  </objects>
  <states>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1611743864002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-30.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1611743864003" version="1">
      <red-def:signature_keyid operation="equals">0946fca2c105b9de</red-def:signature_keyid>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1611743864004" version="1">
      <red-def:signature_keyid operation="equals">8c55a6628608cb71</red-def:signature_keyid>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1611743864005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-30.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1625650209001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-32.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1625650209002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-32.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650910003001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.1.2-48.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1653005178001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.3.12-24.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261610001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">32:9.8.2-0.68.rc16_10.9.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261610007" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">32:9.8.2-0.68.rc16_10.9.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261705001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6_10.10.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1637070791001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1637070791003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649331579001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649331579003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561196001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561196003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650376937001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.15.1-21.el6_6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633601543001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-71.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633601543004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-71.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633601543007" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-71.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633601543013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-71.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634745216001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634745216002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634745216003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634745216005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1648136177001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1648136177002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1648136177003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1648136177005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656447241001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656447241002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656447241003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656447241005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1608724009001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-55.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1617285762001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-56.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1617285762002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-56.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261872001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-57.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261872002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-57.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261944001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-58.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261944002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-58.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262236001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262236002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656961923001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656961923002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654107183001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.3.16-15.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654107183004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.3.16-15.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1623075541001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">12:4.1.1-64.P1.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1623075541010" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">12:4.1.1-64.P1.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634573745001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.0.9-23.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634573745007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.0.9-23.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1635439636001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.35-12.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1635439636007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.35-12.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1623075923001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1623075923007" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1623075923010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1642084196001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1642084196003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1642084196004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1629395067001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.213.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1629395067004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.213.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1637583639001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1637583639002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643818516001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643818516002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1648138117001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1648138117002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1624372464001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.3.3-4.4.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1624372464007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.3.3-4.4.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1650576075001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.[2-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650576075002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.2.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650576075008" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.2.el6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1632261664001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.[3-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261664002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.3.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261664004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.3.el6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1632261839001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.[5-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261839002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.5.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261839004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.5.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261912001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.6.el6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1632261987001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.[7-8]\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261987002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.7.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261987004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.7.el6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1632262296001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6.(x86_64|i686)$)|(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d*).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262296002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262296004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1650986589001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{2,}).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650986589002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650986589004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1650377052001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{2,}|9).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650377052002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650377052004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1646060797001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.1.23-15.el6_6.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1646060797004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.1.23-15.el6_6.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1642429400001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.14-6.4.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643918500001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.14-6.4.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1644500972001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.14-6.4.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1655843011001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.14-6.4.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261762001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-3.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261762004" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-3.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1636378490001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1636378490002" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649695619001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649695619002" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656962023001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3p1-125.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1656962023016" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.9.3-125.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561632001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3p1-125.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561632006" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.9.3-125.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658171011001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3p1-125.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658171011006" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.9.3-125.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633442934001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.2.6p5-16.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633442934004" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:4.2.6p5-16.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1608724134001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-59.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1614885634001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-60.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1614885634003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-60.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261785001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-61.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632261785003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-61.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262317001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-62.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262317003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-62.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1647550273001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1647550273003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657817606001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657817606003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.38-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.58-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.51-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.9402-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005016" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.88-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005019" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.021-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005022" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.021-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005028" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:5.47-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005031" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.27-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005034" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.28-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005037" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.55-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005040" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2003.0-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005043" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.26-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005055" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.09-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005058" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.56-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005061" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.18-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005064" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.02-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005067" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.04-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005070" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.3500-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005073" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.18-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005076" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.16-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005079" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.30-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005085" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.90-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005088" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.34-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005094" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.26-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005097" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.40-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005100" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.04-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005103" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.13-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005106" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.20-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005109" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.17-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005112" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.92-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005115" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:1.9721-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005118" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.15-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005121" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.10.1-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005124" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005130" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.221-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657561005136" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:0.77-146.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.38-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.58-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.51-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.9402-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234006" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.88-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.021-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234008" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.021-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:5.47-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234011" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.27-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234012" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.28-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.55-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234014" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2003.0-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234015" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.26-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234019" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.09-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234020" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.56-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234021" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.18-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234022" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.02-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234023" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.04-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234024" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.3500-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234025" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.18-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234026" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.16-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234027" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.30-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234029" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.90-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234030" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.34-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234032" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.26-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234033" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.40-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234034" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.04-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234035" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.13-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234036" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.20-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234037" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.17-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234038" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.92-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234039" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:1.9721-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234040" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.15-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234041" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.10.1-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234042" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234044" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.221-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328234046" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:0.77-145.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.38-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.58-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.51-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.9402-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264006" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.88-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.021-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264008" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.021-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:5.47-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264011" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.27-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264012" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.28-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.55-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264014" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2003.0-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264015" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.26-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264019" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.09-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264020" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.56-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264021" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.18-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264022" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.02-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264023" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.04-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264024" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.3500-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264025" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.18-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264026" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.16-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264027" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.30-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264029" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.90-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264030" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.34-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264032" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.26-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264033" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.40-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264034" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.04-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264035" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.13-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264036" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.20-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264037" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.17-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264038" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.92-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264039" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:1.9721-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264040" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.15-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264041" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.10.1-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264042" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264044" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.221-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632328264046" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:0.77-146.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1616001357001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-68.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1616001357010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-68.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633442879001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633442879004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1646665957001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1646665957004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1647958513001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1647958513004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658347112001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658347112004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1637673193001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658171149001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643112395001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.99.15-14.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643112395007" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.99.15-14.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1640002354001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.44.0-12.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1640002354010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.44.0-12.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1641903536001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1641903536007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1647255880001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1647255880003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1653004535001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.0.6-12.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654717777001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.8.10-12.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649170979001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649869347001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1653006752001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1653933185001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654529495001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654804579001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els15</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1655320860001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els16</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1655901698001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els18</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657182572001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els19</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1657817751001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els21</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658171278001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els22</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1638803795001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1640621325001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1642087497001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643640508001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1644855718001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1645466182001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1646915237001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1634745118001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2:7.4.629-6.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1637673150001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2:7.4.629-7.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1652706231001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1652706231013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262184001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.275.b01-1.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262184025" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.275.b01-1.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654174749001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.332.b09-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1654174749009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.332.b09-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262221001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1632262337001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2:1.17-33.34.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650376845001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2:1.17-33.37.el6_10.tuxcare.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650575983001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:253-2.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1638803819001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1638803819004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1640621287001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1640621287002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1641904053001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1641904053002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633442827001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.20.51.0.2-5.49.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1633442827002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.20.51.0.2-5.49.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649171018001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.9-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1649171018004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.9-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1638803748001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.40-16.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1638803748004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.40-16.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1652986174001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.40-16.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1652986174002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.40-16.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1650575956001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-25.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1628782974001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-29.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1629902677001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.cloudlinux.els</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1617641265001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.7.2.7-7.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1617641265013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.7.2.7-7.el6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643211942001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.96-11.el6_10.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643211942004" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:0.96-11.el6_10.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1643211942010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.96-11.el6_10.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1618497131001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.0.3-20.el6.cloudlinux.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1658853743001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els23</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1659018147001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[1-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1659018147002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1659018147004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1659638796001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.342.b07-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1659638796009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.342.b07-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1659638964001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1659639100001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els24</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1660761670001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.92.3-3.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1660761947001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.0.6-12.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1660762053001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1660762053005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1660762248001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.1-13.el6_8.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1660762683001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els25</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1661176564001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.7.0.351-2.6.28.0.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1661176564010" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.7.0.351-2.6.28.0.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1661442764001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els26</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1661442999001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.0.6-12.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1662658348001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.0.6-12.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663173256001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663173256002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663173256003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663173256005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663591920001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663591920002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663591920003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1663591920005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1664193203001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.1-13.el6_8.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1664476383001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els30</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1664476612001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1664476612003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1665428177001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.20-1.el6_7.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1665428177004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.20-1.el6_7.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1665501369001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1665501511001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1665680212001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els31</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1667493762001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.1-13.el6_8.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.38-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.58-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.51-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.9402-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434006" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.88-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.021-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434008" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.021-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:5.47-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434011" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.27-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434012" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.28-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.55-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434014" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2003.0-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434015" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.26-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434019" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.09-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434020" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.56-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434021" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.18-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434022" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.02-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434023" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.04-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434024" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.3500-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434025" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.18-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434026" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.16-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434027" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.30-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434029" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.90-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434030" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.34-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434032" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.26-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434033" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.40-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434034" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.04-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434035" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.13-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434036" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.20-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434037" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.17-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434038" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.92-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434039" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:1.9721-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434040" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.15-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434041" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.10.1-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434042" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434044" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.221-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668120434046" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:0.77-146.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668121215001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.20-1.el6_7.2.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1668121215002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.20-1.el6_7.2.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1669066613001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1669066613002" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1669236294001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:253-2.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1669236630001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1669236630004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1669236934001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els32</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1670521677001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1670521677003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1670874451001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-65.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1670874451007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-65.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1670874574001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els33</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1671033543001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els34</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1671126165001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1671126165002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1671126265001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els35</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1671481339001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3p1-125.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1671481339006" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.9.3-125.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1674813830001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els36</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675111939001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675111939002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675111939003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675111939005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675373662001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els37</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675985571001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-32.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675985571002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-32.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675985852001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.362.b09-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1675985852009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.362.b09-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1676025596001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1676025596003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1677231280001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1677231280007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1677791921001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">2:1.23-15.el6_8.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678136793001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678136793002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678136793003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678136793005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678136944001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678136944004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678395661001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1678820960001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els38</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1679924984001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els39</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1681327540001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.44.0-12.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1681327540004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.44.0-12.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1681490707001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1681490707002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1682347721001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1682347721002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1682705952001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[2-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1682705952002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1682705952004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1683236532001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1683236532003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1683814164001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1683814164003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1685377120001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:9.0.4-33.el6_9.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1685377319001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els40</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1685634253001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els41</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1687268961001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1687268961003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1687794906001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.92.3-3.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1688679628001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.372.b07-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1688679628009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.372.b07-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1689702499001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.40-16.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1689702499002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.40-16.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1689886440001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1689886440004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1691081846001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.382.b05-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1691081846009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.382.b05-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1691576939001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3p1-125.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1691576939006" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.9.3-125.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1692108914001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:1.17-33.39.el6_10.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1692293040001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.1p2-9.el6_6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1692293040004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.1p2-9.el6_6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1692293238001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.23-53.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1692293238007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.23-53.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1692632368001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1693410662001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:1.17-33.40.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1693906015001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.15.1-21.el6_6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1694536738001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1694536738002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1695063163001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els42</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1695319372001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els44</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1695835423001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.4.2-3.el6_10.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1695835423007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.4.2-3.el6_10.1.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1696878189001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1696878189004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1696971066001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1696971066002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697136085001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.4.3-3.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697136085007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.4.3-3.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697136232001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697136232003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697464688001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697464688002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697482739001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.92.3-3.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697817200001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.99.15-14.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1697817200003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.99.15-14.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698101447001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698101447002" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.10.3-4.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698101603001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698101603004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698180806001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698180806005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1698352063001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els45</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1699381307001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1699381307003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1699908139001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.92.3-3.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1700164396001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1700591071001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[3-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1700591071002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1700591071004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1700852317001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.23-53.el6_10.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1700852317003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.23-53.el6_10.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1701285908001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.92.3-3.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1701286147001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1701286463001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1701445092001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.7-4.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1702421029001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:1.17-33.41.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1702496332001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1702496473001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1703183093001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.5.18-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1703183242001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1703183411001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1703785140001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3p1-125.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1703785140006" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.9.3-125.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1705079922001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1705079922004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1705494430001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[4-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1705494430002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1705494430004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1706027577001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1706027727001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1706698228001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.402.b06-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1706698228009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.402.b06-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1708427919001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-32.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1708427919002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.8.6p3-32.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1708639232001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1708639232003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1709204660001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[5-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1709204660002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els15</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1709204660004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els15</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1709563938001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els46</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1710437162001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1710437162003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1711491615001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1712262573001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.14-14.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1713523278001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:436-13.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1715280966001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1715946466001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:436-13.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1716287930001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.20-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1717694505001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1717694505002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1718901417001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1718901417002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1724705338001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1724705338003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1724774331001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[6-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1724774331002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els16</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1724774331004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els16</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1725385588001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.103.11-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1725385588004" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:0.103.11-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1725385588013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.103.11-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1725655852001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1725655852003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1725993966001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.1-13.el6_8.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1726059935001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.422.b05-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1726059935009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.422.b05-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1726655093001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[7-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1726655093002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els17</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1726655093003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els17</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1726655093005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els17</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1728071619001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1728071619004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1728297376001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|1[8-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1728297376002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els18</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1728297376003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els18</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1728297376005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els18</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1728582568001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:1.17-33.42.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1729628500001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1730139582001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1732198712001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.103.12-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1732198712002" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:0.103.12-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1732198712005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.103.12-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1731956848001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.7.2.7-7.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1731956848005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.7.2.7-7.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1732702350001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1732702216001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1733158910001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[2-9][0-9]|19).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1733158910002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els19</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1733158910003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els19</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1733158910005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els19</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1733421975001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1734039943001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1735122554001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:4.2.6p5-16.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1735122554002" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:4.2.6p5-16.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1737153996001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1739292069001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9][0-9]|2[0-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1739292069002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els20</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1739292069003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els20</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1739292069005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els20</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1740823970001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1740823970003" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">33:9.8.2-0.68.rc1.el6.11.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1740656525001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9][0-9]|2[1-9]).(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1740656525002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els21</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1740656525003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els21</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1740656525005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els21</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1742232795001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1742232795002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1741636522001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1741636522003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1747057793001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1747057793003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1748366748001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[2-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748366748002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els22</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748366748003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els22</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748366748005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els22</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748947069001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.13.3-60.0.4.el6_10.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748947069025" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.13.3-60.0.4.el6_10.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1748947069037" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.13.3-60.0.4.el6_10.2.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1750175787001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[3-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1750175787002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els23</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1750175787003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els23</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1750175787005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els23</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1751134987001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.0.6-12.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1751612441001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.0.6-12.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1751612332001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.452.b09-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1751612332009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.452.b09-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1752748974001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1752748974003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.38-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.58-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.51-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.9402-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595006" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.88-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595007" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.021-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595008" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.021-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595010" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:5.47-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595011" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.27-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595012" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.28-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595013" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.55-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595014" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2003.0-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595015" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.26-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595019" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.09-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595020" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.56-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595021" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.18-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595022" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.02-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595023" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.04-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595024" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.3500-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595025" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.18-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595026" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.16-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595027" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.30-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595029" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.90-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595030" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.34-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595032" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.26-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595033" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.40-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595034" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.04-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595035" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:3.13-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595036" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.20-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595037" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.17-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595038" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.92-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595039" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:1.9721-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595040" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.15-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595041" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.10.1-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595042" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">4:5.10.1-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595044" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:0.221-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753209595046" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:0.77-146.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753377886001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753377886003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1753780501001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1754342507001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.20-1.el6_7.2.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1754342507002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.20-1.el6_7.2.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1754381382001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1754381382003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755074145001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.462.b08-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755074145009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.462.b08-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755074254001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.6.11-15.el6_7.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755074254004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.6.11-15.el6_7.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755074254025" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.6.11-15.el6_7.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755184971001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755184971003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1755707175001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[4-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755707175002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els24</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755707175003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els24</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755707175005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els24</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755513827001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:6.0.24-115.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1755271747001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.12-7.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1756409922001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.12-10.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1756483990001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:5.3.3-55.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1757016520001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1757076484001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els14</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1757608775001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els15</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1757608775004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els15</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758035415001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758035415002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758035415003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.2.15-72.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758035415005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.2.15-72.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1757700075001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1757700075002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1758010245001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[5-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758010245002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els25</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758010245003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els25</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758010245005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els25</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758796854001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.4.2-81.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758796854004" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.4.2-81.el6_10.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758796775001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.3.1-3.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758711950001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758711950002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.12-2.215.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758645818001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.58-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758645818002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.58-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758709468001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758709468003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758709468004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758645375001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.4.3-3.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758645375003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.4.3-3.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758645976001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.0.9-23.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758645976003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.0.9-23.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758896552001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.0.9-23.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758896552003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.0.9-23.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758896647001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758896647003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1758896647004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els5</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759154304001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.4.3-3.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759154304003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:0.4.3-3.el6.tuxcare.els3</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759336759001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759336759003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759433716001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.23-53.el6_10.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759433716003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.6.23-53.el6_10.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759485890001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.9-1.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1759485890002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.4.9-1.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760112150001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.44.0-12.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760112150004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:3.44.0-12.el6.tuxcare.els8</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760112341001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760112341002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els9</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760559298001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1760559298003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.0.1e-63.el6.tuxcare.els13</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761139574001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761139574003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1762454401001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[7-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1762454401002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els27</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1762454401003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els27</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1762454401005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els27</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1761139764001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[6-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761139764002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els26</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761139764003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els26</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761139764005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els26</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761859779001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1761859779003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.7.6-21.el6_8.1.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1763543346001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els15</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1763397982001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1767973696001" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1767973696003" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.7.1-10.el6_10.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1768669128001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(\d{3,}|[3-9]\d|2[8-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1768669128002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els28</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1768669128003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els28</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1768669128005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els28</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1770734656001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.1-13.el6_8.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1771238245001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(?:\d{3,}|[3-9]\d|29)\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771238245002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els29</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771238245003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els29</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771238245005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els29</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771580716001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771580716003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771580716004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.28.8-12.el6.tuxcare.els6</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771926895001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els16</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1771926895004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els16</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772454796001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772454796005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:1.2.3-29.el6.tuxcare.els4</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772577130001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els17</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1772577130004" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.6-70.el6.tuxcare.els17</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1773043650001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(?:\d{3,}|[4-9]\d|3[0-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773043650002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els30</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773043650003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els30</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773043650005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els30</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773506968001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.482.b08-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773506968009" version="1">
      <red-def:evr datatype="evr_string" operation="less than">1:1.8.0.482.b08-1.el6.tuxcare.els1</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1773506143001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els47</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1774021165001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.0.1-13.el6_8.tuxcare.els7</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1774276586001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1774276586002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:7.19.7-59.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1774432816001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">3:7.4.629-5.2.el6.tuxcare.els48</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1774946829001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.1.23-30.el6.tuxcare.els16</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775148022001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775148022002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els10</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775062580001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">7:3.4.14-16.el6.tuxcare.els12</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775725743001" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.7.2.7-7.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775725743005" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:6.7.2.7-7.el6.tuxcare.els2</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775722568001" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775722568002" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">1:2.20.51.0.2-5.48.1.el6.tuxcare.els11</red-def:evr>
    </red-def:rpminfo_state>
    <unix-def:uname_state id="oval:com.tuxcare.clsa:ste:1775745943001" version="1">
      <unix-def:os_release operation="pattern match">(^2\.6\.32\-754\.35\.8\.el6\.tuxcare\.els(?:\d{3,}|[4-9]\d|3[1-9])\.(x86_64|i686)$)</unix-def:os_release>
    </unix-def:uname_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775745943002" version="1">
      <red-def:arch datatype="string" operation="equals">x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els31</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775745943003" version="1">
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els31</red-def:evr>
    </red-def:rpminfo_state>
    <red-def:rpminfo_state id="oval:com.tuxcare.clsa:ste:1775745943005" version="1">
      <red-def:arch datatype="string" operation="pattern match">i686|x86_64</red-def:arch>
      <red-def:evr datatype="evr_string" operation="less than">0:2.6.32-754.35.8.el6.tuxcare.els31</red-def:evr>
    </red-def:rpminfo_state>
  </states>
</oval_definitions>
